Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 15:24

General

  • Target

    54db64a84496755b91d94c070eea3ce26459ca2213242a6248e3704c44a11934.exe

  • Size

    33KB

  • MD5

    92509af9b7a485ad0d9384e335b98760

  • SHA1

    57eecbf4dca080971b143f731242b63c2b003e27

  • SHA256

    54db64a84496755b91d94c070eea3ce26459ca2213242a6248e3704c44a11934

  • SHA512

    63ea72155764e9ccc331a0eb25f51189151eb7667c28b1b8c29e60504bc6e128e0e0f032d299c4ba0eea26365218c160ebebfa767e79bf17c0c104701f5eb560

  • SSDEEP

    384:8ILsbCRufBonxlSru+kSBPi+8mKFLRoEjGsbiZOLT9npzl+1PZ0n5yf1kzauvkfn:3sQeonOxkSB0FdoXsVpMhiau8fn

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54db64a84496755b91d94c070eea3ce26459ca2213242a6248e3704c44a11934.exe
    "C:\Users\Admin\AppData\Local\Temp\54db64a84496755b91d94c070eea3ce26459ca2213242a6248e3704c44a11934.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\system32\RunDll32.exe
      RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      PID:1492
    • C:\Windows\system32\RunDll32.exe
      RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 1
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -ResetDestinationList
        3⤵
          PID:1116
      • C:\Windows\system32\RunDll32.exe
        RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        PID:1120
      • C:\Users\Admin\AppData\Roaming\explorer.exe
        "C:\Users\Admin\AppData\Roaming\explorer.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:760

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\explorer.exe

            Filesize

            33KB

            MD5

            92509af9b7a485ad0d9384e335b98760

            SHA1

            57eecbf4dca080971b143f731242b63c2b003e27

            SHA256

            54db64a84496755b91d94c070eea3ce26459ca2213242a6248e3704c44a11934

            SHA512

            63ea72155764e9ccc331a0eb25f51189151eb7667c28b1b8c29e60504bc6e128e0e0f032d299c4ba0eea26365218c160ebebfa767e79bf17c0c104701f5eb560

          • C:\Users\Admin\AppData\Roaming\explorer.exe

            Filesize

            33KB

            MD5

            92509af9b7a485ad0d9384e335b98760

            SHA1

            57eecbf4dca080971b143f731242b63c2b003e27

            SHA256

            54db64a84496755b91d94c070eea3ce26459ca2213242a6248e3704c44a11934

            SHA512

            63ea72155764e9ccc331a0eb25f51189151eb7667c28b1b8c29e60504bc6e128e0e0f032d299c4ba0eea26365218c160ebebfa767e79bf17c0c104701f5eb560

          • memory/760-69-0x000007FEF2B50000-0x000007FEF3BE6000-memory.dmp

            Filesize

            16.6MB

          • memory/760-68-0x000007FEF3BF0000-0x000007FEF4613000-memory.dmp

            Filesize

            10.1MB

          • memory/1368-54-0x000007FEF3BF0000-0x000007FEF4613000-memory.dmp

            Filesize

            10.1MB

          • memory/1368-67-0x0000000000B06000-0x0000000000B25000-memory.dmp

            Filesize

            124KB

          • memory/1368-56-0x0000000000B06000-0x0000000000B25000-memory.dmp

            Filesize

            124KB

          • memory/1368-55-0x000007FEF2B50000-0x000007FEF3BE6000-memory.dmp

            Filesize

            16.6MB

          • memory/1492-58-0x000007FEFB641000-0x000007FEFB643000-memory.dmp

            Filesize

            8KB