Analysis

  • max time kernel
    140s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 13:05

General

  • Target

    4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe

  • Size

    139KB

  • MD5

    a236c0b8e461f5bee9702aebc4cfc769

  • SHA1

    d5fb02bb058db459e1094c5bf18c64e19364f55a

  • SHA256

    4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b

  • SHA512

    0a679a923ef88c579b7cf558db46da7d899b615c7546950fd1f96a9ad98db0662a5b342c3a80f0efb2f8d48974e59b5162b435a4c3abcaaa29974de4f563eac1

  • SSDEEP

    3072:35feitbnL/lrPdldokXI25nPExUrpa0zw45U3766:3BX//voqLP6UFfwvr

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe
    "C:\Users\Admin\AppData\Local\Temp\4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=gOO_UqzEc5Y
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    0345fb796f4f26c9ff88187e113554b7

    SHA1

    7b87578cfb91a2a7850a4226d1bee91ab3efd5b6

    SHA256

    05bd748690c595f4d87e7515fcced3fc57be369909eb432548ea30f34fe0f86b

    SHA512

    131bcff74e384e1b3c6398bfb7f96d6403aa7ea0015b323ce8dbe095c17e2914da3c73ccd06edfc45ccfa5761193df9f0f7f98f31daeab0c94a24aaaa75e4888

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    027f17f03d498f955fcbfae963e3bc3d

    SHA1

    87037c8a5bde72bcd49425916da01420d7687c81

    SHA256

    710d0728326bf897669d47384b0fdb7e62d50855c94af15c0eb5f6314f9a04a7

    SHA512

    00f1d316ad72f5babbf340530720c64492f00a46f8e985fa0cec4451e388611f0c493301ca67794b0fc3d7f9badf95772bb479692b18f6022e171eb2959757a0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X33GB9OX.txt

    Filesize

    608B

    MD5

    ea261219029c744f680b870d4a03fc84

    SHA1

    1de56b7e2b5ef837086379283f071cadac10055f

    SHA256

    c07a062a8abb39c388ebc1ba13a313ba4ed07509ecfa7e96f5a0a7ba1a889949

    SHA512

    c1a76cc565298368f30ec8a6bd2a8ef33a8cc9c80d75ad14af13c82f9b75ba1a67b93b583b809fcde14cc25e2bad95c2299ab69013296b6b940e64b27dfd1320

  • memory/1396-54-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1396-55-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/1396-58-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB

  • memory/1396-59-0x0000000000270000-0x00000000002B6000-memory.dmp

    Filesize

    280KB

  • memory/1396-60-0x0000000003210000-0x0000000003CCA000-memory.dmp

    Filesize

    10.7MB

  • memory/1396-61-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB