Analysis

  • max time kernel
    151s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 22:03

General

  • Target

    ef7d5edea1d6cd87ea8cfcf720aab0261bd20c0e06de4c093317dd1fd73bfac8.exe

  • Size

    1.2MB

  • MD5

    41af5d97063e79571d2657ba3187c266

  • SHA1

    54b0f7f811b543f336fc60c6bac9ac8b9402c67f

  • SHA256

    ef7d5edea1d6cd87ea8cfcf720aab0261bd20c0e06de4c093317dd1fd73bfac8

  • SHA512

    99d466ff3262ef412d61f426ea2bff455b6e586b76d81fc77cabde9c8b8fa7188bf6699f3339ee6b1714bd85ad8ddb4ae816135b9b81b60894a90064716471ff

  • SSDEEP

    24576:KAFJnZX4kxKlUJKztq+qGh0FyCBQW6HYTa6ac+VHnX23Om5ewVR4eotaE:HFJnjPKzttIIRHca6aBwdfVRMME

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef7d5edea1d6cd87ea8cfcf720aab0261bd20c0e06de4c093317dd1fd73bfac8.exe
    "C:\Users\Admin\AppData\Local\Temp\ef7d5edea1d6cd87ea8cfcf720aab0261bd20c0e06de4c093317dd1fd73bfac8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\windows\SysWOW64\bootc0g.exe
        "C:\windows\system32\bootc0g.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://adf.ly/ynSD
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1824 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2020
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://toyibg.blogspot.com/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    e6598e78d16f0c2e1ec90aef53c66a01

    SHA1

    c5d66a9ea974bc0be87ef3a1bc023597a7048d7a

    SHA256

    98b5923fa0f04b0461cb24ff88a5f8f2d6bf6beca0a56afa75b920de6d84994c

    SHA512

    b8cdbdc4fe640f1512490888176b4aeec8885880ef110ea16bf18e0b9b39d03c3961f8000653b68a2e39a48a9d8391bf50f60b2073647147cf1d4c7d130481bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    226B

    MD5

    ae2cf8a69a2b4f1ab430cdb410746f48

    SHA1

    8479a403620c859e69a4795cb7c6a99d883009b6

    SHA256

    6e46c296742fe5de188635f12cc2d70c4f1982c07bb98f451012d75825cbf8f8

    SHA512

    cbf4fcfe4ae83aa22977d52648bf9c52721beb941a051df029506154c8b989072121a5ae034c4401219b1e044dcb87a52ea50d6c8760799d196f9ebcb2b0c2a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    dde51b24c49e340fc03639565a4b2f8c

    SHA1

    b024498ea37587b4672d9d47abcf469d681ffc25

    SHA256

    423d267118b70a55968796430494401ff92b96cc6f756adc100165b25f690fb9

    SHA512

    6b4b03edc7fd63f809ab7c0e3fa541a5a6cc5889e6fb03f4c1e9656b2bd17d19812aecf68951a4ed27d037f936305788c3469212de259436d849b7f84a114b9e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E787CB41-50F4-11ED-8C74-D6AAFEFD221A}.dat

    Filesize

    5KB

    MD5

    7369f528020d41cb6a4bceed2dabb573

    SHA1

    18e7ec405b53adeb293172c7a61990b0f7e95649

    SHA256

    0816a1f17ec4ef026f43e9eca3c1ef5b7c13dbf5076963033b6f0d2edfc5e36d

    SHA512

    1c9e46b6409c3f57b4a2cc059be8290bc70c10dc5e7c22d4c7599487c2b9667b7031b01644ac6654a14752a37a3843663af129de7acd4652a963162b88a4795c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E78D97A1-50F4-11ED-8C74-D6AAFEFD221A}.dat

    Filesize

    4KB

    MD5

    c37b2bc9c43a8456eb438b03ac7a04f1

    SHA1

    3095112de950ac61dc505089036a964a041beac8

    SHA256

    d7118be03cd4b0d859b403346d8dbf98e330bd264a41338601d9a29abd65d6aa

    SHA512

    dfeae6dc49ce9943842867263a878e66bc706a26b54fffc4d42b1fb5ac8ee53b683b28f54ca970a7920fbea198252757d983588fc99ee247a8f0ad028dc6fca6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    8KB

    MD5

    440d6cfbb88a85f9375069b035192604

    SHA1

    3f6b3a8d647d9ef0ca43d2c5b681e91c8b2c607f

    SHA256

    d6b08de87965018e77b4be2d156c36f44dfe320842a96f28e1688ebf6d8f9ea7

    SHA512

    91ff3a9962632ff50d65b9cbb2cab995bf3688f7e5e119f2295a04c7c82d9c6d41509a5fd3e58683db1d54c8123f46307cc8b30d31eea2a4d57dc9978485af74

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE

    Filesize

    1.3MB

    MD5

    2e95b3dfacf8450e01da3adbf670cd17

    SHA1

    6f4a04756206a031df6128d409904a58510c5b8c

    SHA256

    9b5f79dbe2f0babda391e6a49b6660ef6255c25801b57d9996f00d49047f6fac

    SHA512

    39fc703c8d776b59d582c44aeb6209c48df860b91fe9c5a9ad0016f71f45f4fbcf4cfe8860a0d3be527b6a8b1ff425eb1cb300f24fea189f681d2ee1b1f6e2a2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE

    Filesize

    1.3MB

    MD5

    2e95b3dfacf8450e01da3adbf670cd17

    SHA1

    6f4a04756206a031df6128d409904a58510c5b8c

    SHA256

    9b5f79dbe2f0babda391e6a49b6660ef6255c25801b57d9996f00d49047f6fac

    SHA512

    39fc703c8d776b59d582c44aeb6209c48df860b91fe9c5a9ad0016f71f45f4fbcf4cfe8860a0d3be527b6a8b1ff425eb1cb300f24fea189f681d2ee1b1f6e2a2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EVOJI7B6.txt

    Filesize

    608B

    MD5

    8e8544a9914667564110fe7bb86ad9e0

    SHA1

    ed7efd7088a5ec6cf34dc382e3b0c47dd020d99f

    SHA256

    7f178dfeac62a940875aadebe1df02dcb518b8ae90177f5d9c3fa04120a65de7

    SHA512

    f51e9df21d1d7fe5f00021b0360cb3ab6241ebf0bacecb0da64c03a8d876969e79dbf5222023f2cdf3ced38d7b3dea72eab5cecf16e2f06c7710986e0cfb0293

  • C:\Windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • C:\windows\SysWOW64\GIFviewer.ocx

    Filesize

    100KB

    MD5

    73404435b36b8cb9ea68be6d4249488e

    SHA1

    ecd6f0e28c4f4ac6c1943a7647f42a5d91c14f02

    SHA256

    2123cadad9f7da81601c5e09105a569fedda561b4b12e87f0c0f6b4afa286e5c

    SHA512

    e260099024bdc4711ef068455e350cb400042f5fd5066b07b024e49b8a13b6c058347f2e4e68ff73704358b51db851e4e06c28cb2f3cd36b64d9023c748dcad7

  • C:\windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE

    Filesize

    1.3MB

    MD5

    2e95b3dfacf8450e01da3adbf670cd17

    SHA1

    6f4a04756206a031df6128d409904a58510c5b8c

    SHA256

    9b5f79dbe2f0babda391e6a49b6660ef6255c25801b57d9996f00d49047f6fac

    SHA512

    39fc703c8d776b59d582c44aeb6209c48df860b91fe9c5a9ad0016f71f45f4fbcf4cfe8860a0d3be527b6a8b1ff425eb1cb300f24fea189f681d2ee1b1f6e2a2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE

    Filesize

    1.3MB

    MD5

    2e95b3dfacf8450e01da3adbf670cd17

    SHA1

    6f4a04756206a031df6128d409904a58510c5b8c

    SHA256

    9b5f79dbe2f0babda391e6a49b6660ef6255c25801b57d9996f00d49047f6fac

    SHA512

    39fc703c8d776b59d582c44aeb6209c48df860b91fe9c5a9ad0016f71f45f4fbcf4cfe8860a0d3be527b6a8b1ff425eb1cb300f24fea189f681d2ee1b1f6e2a2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE

    Filesize

    1.3MB

    MD5

    2e95b3dfacf8450e01da3adbf670cd17

    SHA1

    6f4a04756206a031df6128d409904a58510c5b8c

    SHA256

    9b5f79dbe2f0babda391e6a49b6660ef6255c25801b57d9996f00d49047f6fac

    SHA512

    39fc703c8d776b59d582c44aeb6209c48df860b91fe9c5a9ad0016f71f45f4fbcf4cfe8860a0d3be527b6a8b1ff425eb1cb300f24fea189f681d2ee1b1f6e2a2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FULLHA~1.EXE

    Filesize

    1.3MB

    MD5

    2e95b3dfacf8450e01da3adbf670cd17

    SHA1

    6f4a04756206a031df6128d409904a58510c5b8c

    SHA256

    9b5f79dbe2f0babda391e6a49b6660ef6255c25801b57d9996f00d49047f6fac

    SHA512

    39fc703c8d776b59d582c44aeb6209c48df860b91fe9c5a9ad0016f71f45f4fbcf4cfe8860a0d3be527b6a8b1ff425eb1cb300f24fea189f681d2ee1b1f6e2a2

  • \Windows\SysWOW64\GIFviewer.ocx

    Filesize

    100KB

    MD5

    73404435b36b8cb9ea68be6d4249488e

    SHA1

    ecd6f0e28c4f4ac6c1943a7647f42a5d91c14f02

    SHA256

    2123cadad9f7da81601c5e09105a569fedda561b4b12e87f0c0f6b4afa286e5c

    SHA512

    e260099024bdc4711ef068455e350cb400042f5fd5066b07b024e49b8a13b6c058347f2e4e68ff73704358b51db851e4e06c28cb2f3cd36b64d9023c748dcad7

  • \Windows\SysWOW64\GIFviewer.ocx

    Filesize

    100KB

    MD5

    73404435b36b8cb9ea68be6d4249488e

    SHA1

    ecd6f0e28c4f4ac6c1943a7647f42a5d91c14f02

    SHA256

    2123cadad9f7da81601c5e09105a569fedda561b4b12e87f0c0f6b4afa286e5c

    SHA512

    e260099024bdc4711ef068455e350cb400042f5fd5066b07b024e49b8a13b6c058347f2e4e68ff73704358b51db851e4e06c28cb2f3cd36b64d9023c748dcad7

  • \Windows\SysWOW64\GIFviewer.ocx

    Filesize

    100KB

    MD5

    73404435b36b8cb9ea68be6d4249488e

    SHA1

    ecd6f0e28c4f4ac6c1943a7647f42a5d91c14f02

    SHA256

    2123cadad9f7da81601c5e09105a569fedda561b4b12e87f0c0f6b4afa286e5c

    SHA512

    e260099024bdc4711ef068455e350cb400042f5fd5066b07b024e49b8a13b6c058347f2e4e68ff73704358b51db851e4e06c28cb2f3cd36b64d9023c748dcad7

  • \Windows\SysWOW64\GIFviewer.ocx

    Filesize

    100KB

    MD5

    73404435b36b8cb9ea68be6d4249488e

    SHA1

    ecd6f0e28c4f4ac6c1943a7647f42a5d91c14f02

    SHA256

    2123cadad9f7da81601c5e09105a569fedda561b4b12e87f0c0f6b4afa286e5c

    SHA512

    e260099024bdc4711ef068455e350cb400042f5fd5066b07b024e49b8a13b6c058347f2e4e68ff73704358b51db851e4e06c28cb2f3cd36b64d9023c748dcad7

  • \Windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • \Windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • \Windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • \Windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • \Windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • \Windows\SysWOW64\bootc0g.exe

    Filesize

    359KB

    MD5

    f782d7f76ad1c7f7c90dde21a6ee7668

    SHA1

    bbcbfc19575a1678a7a806a308c36b783e9b5bbd

    SHA256

    d9979dbb45f425549b8e7d2397de591db3c21d7a09c25c0eaf4df9496c19386d

    SHA512

    b75a9196993095e43757b0315de6403cd868a4eff91b7694b579ecd84ad943ab79f0f63f59313331afbb383ba74813cf62a7d40c5b052945801ed64c93b1ec4b

  • memory/1300-82-0x0000000005150000-0x00000000052EE000-memory.dmp

    Filesize

    1.6MB

  • memory/1300-80-0x0000000004C70000-0x0000000004C89000-memory.dmp

    Filesize

    100KB

  • memory/1300-88-0x00000000040D0000-0x00000000040DA000-memory.dmp

    Filesize

    40KB

  • memory/1300-89-0x00000000040D0000-0x00000000040DA000-memory.dmp

    Filesize

    40KB

  • memory/1300-90-0x00000000040D0000-0x00000000040DA000-memory.dmp

    Filesize

    40KB

  • memory/1300-91-0x00000000040D0000-0x00000000040DA000-memory.dmp

    Filesize

    40KB

  • memory/1300-92-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-93-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-94-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-95-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-86-0x00000000040C0000-0x00000000040CA000-memory.dmp

    Filesize

    40KB

  • memory/1300-87-0x00000000040C0000-0x00000000040CA000-memory.dmp

    Filesize

    40KB

  • memory/1300-100-0x00000000040D0000-0x00000000040DA000-memory.dmp

    Filesize

    40KB

  • memory/1300-99-0x00000000040C0000-0x00000000040CA000-memory.dmp

    Filesize

    40KB

  • memory/1300-98-0x00000000040C0000-0x00000000040CA000-memory.dmp

    Filesize

    40KB

  • memory/1300-81-0x0000000005110000-0x0000000005124000-memory.dmp

    Filesize

    80KB

  • memory/1300-102-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-103-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-104-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-105-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-106-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1300-96-0x0000000004230000-0x000000000423A000-memory.dmp

    Filesize

    40KB

  • memory/1516-54-0x0000000075E11000-0x0000000075E13000-memory.dmp

    Filesize

    8KB