Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 23:09

General

  • Target

    378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e.exe

  • Size

    489KB

  • MD5

    a1b068d24c66f0965990bfda13074eb5

  • SHA1

    91d5b0771aff8bed98f0aae3239532989d08e584

  • SHA256

    378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e

  • SHA512

    1f94c3756e93748bb8c1ba13cf09f44f9ee61855871e546ccf6a4fa24edde50cfee54f91135780b7d19f81e3c07185c82813482531e8f4bce4f275ee4a9dd08c

  • SSDEEP

    12288:wSTURpWedRofFPydxEf62gpWxEMi/dvTj:wST8pWwofQxEf62gMEMi/dvTj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e.exe
    "C:\Users\Admin\AppData\Local\Temp\378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\program files (x86)\internet explorer\wmpscfgs.exe
      "C:\program files (x86)\internet explorer\wmpscfgs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:624
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe" Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:360
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe" Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1552
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:788
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:472078 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KA0N5A21.txt

    Filesize

    115B

    MD5

    44adddd3a7cc692b39bc647912a800f6

    SHA1

    2c4743280e7360f5f6523ab0e9d52391c460fce5

    SHA256

    cad02f357161fbf7cf39cc9b36908f5be812c41e85e4d655d636a41a8f14e384

    SHA512

    40b833018c7abe97682c609642efddc37918457bbb24b429e40ee35609380070f94f72eca9329f9249d6edcc1eafa2768576eaba7dc96c3520db10a1c029114b

  • C:\program files (x86)\internet explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • \??\c:\program files (x86)\adobe\acrotray.exe

    Filesize

    511KB

    MD5

    108bb48abbdce5fdb87ca0eca7d87bfd

    SHA1

    bc03956df8095ad3778ec2271a126f59ebe6df71

    SHA256

    102eb5a4c5041f190e752ba61a4d3ffc4d0dce84ada96b756a493af2666fa64d

    SHA512

    a98705173020d711a8da885f9dfa35b785afb2d2e5fb3853aa0240c537258ac5675ccfdbc5afc6d7c0e674bf57cc77274e337fccad5bc94a0ec57916ae424214

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    519KB

    MD5

    9543cc06a0ffd7f25a2074340a0bd894

    SHA1

    870f0f3bcdf200e4dbb13fa0f1520e007910095e

    SHA256

    b941aaab62ca5e12ed0faf7a6abcde5e6650c9a207565940d58feef2fee9d08c

    SHA512

    5952d0421aa64b3c26781252652f98aaaa00f3cfaa2a32e7c70b160d8b5ec040634b6f2133df10430e217b05451af3ad0bc185e0af926cd810a2d5bf765bd194

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    504KB

    MD5

    2355ed836c6d72de05f12ace46fa2ae7

    SHA1

    bb253e4a3868ae8d18d360a70b9988fdd40d4d8d

    SHA256

    3b2d1528e70cd6a8b3725561d64b5ebcf1334365c669ae62629403e37f675086

    SHA512

    82e95bf2a8123bd7ffe7e33b6e4631889b73fc9038627f11edd74fb10cfaef000a589af9c6301957265117bc85f2c05957cc8e0faa84ed0ccb00a1678774091a

  • memory/1352-54-0x0000000075B51000-0x0000000075B53000-memory.dmp

    Filesize

    8KB

  • memory/1352-55-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1680-68-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB