Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 21:58

General

  • Target

    84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe

  • Size

    286KB

  • MD5

    93ae065f559a891f6e3ea4abeb58d036

  • SHA1

    073596e51d809e227aeb5984142e93c2526179c6

  • SHA256

    84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90

  • SHA512

    47c13d211da60bba0ad0a5d90d820e16516e6c21f2ba0705f1c040598597a7e7295557b92f9a9cbe0cc87ba4769fe6a8572086247f82a26768b064d2c283d5d5

  • SSDEEP

    6144:RDKW1Lgbdl0TBBvjc/TWawZq8CC95GpQWQByQWBoG2oJ:hh1Lk70TnvjcBwtCC7GprMGoGTJ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
    "C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://badeshan.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1520
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/emre.turgut.31521
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:952 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:776

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          d15aaa7c9be910a9898260767e2490e1

          SHA1

          2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

          SHA256

          f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

          SHA512

          7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          0df4831226d6ceb34345636e36b85d1a

          SHA1

          3291656541c8e3aeaf97c1d8e57e26a21c56e429

          SHA256

          ab26e2d2e6c43d44cb240638d54ca0bdafb22b70d9ed73c78b17b074f5691417

          SHA512

          572a30503ff9e2e35e427c044d0b88f729bedf4c7581a82d81105fc0de4a2d4caa23a55e2a271bb8c8932018eaf51c1e356a4488a2e916c9b3c6541aa941bf3c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fd16ac1e8e5621d83e1236e8f10d0ed3

          SHA1

          cb751954fac6fa65bab073e017d168346c3969b0

          SHA256

          97a6c8b655d8f6bc4de399b9e9315798f71ff8427bde3d059456ba7964b1d68a

          SHA512

          01ad2f967724e16b31a403f69714370a2b7118fa84b8566b2dd65c0862020f4befd2fafca624aee7d21ff386ac783bd5ece7092fe8c41cc478d1284e0b3127a4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          920c61ba123f65018a6802401d4f2659

          SHA1

          ae7e93ef68019bedf02948f4315968c91fe27eac

          SHA256

          dfe5dd01993b6c6bc6e77dfe96f4e9108776693de0bc5c724673a92088e79c55

          SHA512

          d62ca7d72f00a139a33f64fa34e4c61a165c397e1285c2bd934ff40874c0b2141e3a26cb5a9ded27773be147b7d0963b0e93cbe5ff499e04a62a7f369ae25274

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E2555E91-50F3-11ED-A964-EAF6071D98F9}.dat

          Filesize

          5KB

          MD5

          c636d276db74c5046aea1cfc218799f2

          SHA1

          d9f7d3697e8689824e3ea696f7308560c57057f1

          SHA256

          a23059df94b54ce5c88c1dd9efe5b7aba61fa354062334885dbea04b6f97b121

          SHA512

          044125f7861ea218ba1d54b364a398ecd1a31245e1db46e20c6e59b6115c40bb2973073167d7acfa21c69b28d553c221eb9f2261607b6ea424ae1db02ab2c3c2

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E25C82B1-50F3-11ED-A964-EAF6071D98F9}.dat

          Filesize

          4KB

          MD5

          fa4a9e491ed6d6dbe0563e07c028fb1d

          SHA1

          25bfb1d2ac1612c7c1eb22e20979b3a6b4d0ce9e

          SHA256

          62fd933f5682ddf5d76daa25bbc20d0211da6aa164b7b624fc7528037d5767cd

          SHA512

          9786afeb1861920b3442105bf4fcfa9e91282bd8a931e68faeedeba7148aa64051fc29bcf83dfdb9a03186099078b376c06458251410a78901485d238d97afbb

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

          Filesize

          5KB

          MD5

          dd21c9b1f04dcd9d1831b3eb53cb27a8

          SHA1

          bcd1147300a981752d7149ff0fb5175ab2acebd8

          SHA256

          80671a6dc9d5e987c372d09457577798332cb2c476020071155961435e4039fc

          SHA512

          9e4f02a968fed1a2435046fe58dba164d1414eaaa3555a10235c28f29eab609a20c61044c50bee44c0b95bd662a041bb7ec0902d1357d3e8f059431ab399d1dc

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KV9RASUV.txt

          Filesize

          606B

          MD5

          15c92ed7996282ab89bcd094f561bff7

          SHA1

          2a0c95443c9840cde35bed082eca9df306a0c932

          SHA256

          346cde61423599655aff86f5b1f187e7d927b0b3c0623b408386c8d721d5f6bd

          SHA512

          73c24be81de7cf294b9fd2defc1f2645cf26bd21fd8f7d8e6b1072b43e9e803cef15f941cc2f032cc26df4389634c9baae2300eb1bad1d88e04efd0f6b06aa6c

        • memory/1248-54-0x0000000001E90000-0x0000000001ECC000-memory.dmp

          Filesize

          240KB

        • memory/1248-61-0x000000000482A000-0x000000000483B000-memory.dmp

          Filesize

          68KB

        • memory/1248-58-0x000000000482A000-0x000000000483B000-memory.dmp

          Filesize

          68KB

        • memory/1248-57-0x0000000004C40000-0x0000000004C48000-memory.dmp

          Filesize

          32KB

        • memory/1248-56-0x0000000075351000-0x0000000075353000-memory.dmp

          Filesize

          8KB

        • memory/1248-55-0x0000000002170000-0x00000000021AC000-memory.dmp

          Filesize

          240KB