Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 07:07

General

  • Target

    44bc48d0a610192edbaf3b710b55967fd2efa8a8d7199ed082d8d4cc57da6513.exe

  • Size

    736KB

  • MD5

    818705c9a9b0be62eab525a5326d473b

  • SHA1

    8bddf2e256a491cd2b4ec97eb6a91689ba524df3

  • SHA256

    44bc48d0a610192edbaf3b710b55967fd2efa8a8d7199ed082d8d4cc57da6513

  • SHA512

    c36b947c2494bf64f6fd112f8f0be67c248105729e59f70745ee991497388e124d9163fb1387f8309cd5dfe20ac8ab9ed65fb096a6a831d5d502a35fe7f0acdf

  • SSDEEP

    12288:gpQFKc84EnyLz1emmZ+kEOc4dYchfL7pNWZQZrJe2WhmbH:gpQAcnLzY7EP6PhfLziQMhhmbH

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44bc48d0a610192edbaf3b710b55967fd2efa8a8d7199ed082d8d4cc57da6513.exe
    "C:\Users\Admin\AppData\Local\Temp\44bc48d0a610192edbaf3b710b55967fd2efa8a8d7199ed082d8d4cc57da6513.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun64.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
          PID:956
        • C:\Windows\SysWOW64\cacls.exe
          cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
          3⤵
            PID:516
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun5.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:1740
            • C:\Windows\SysWOW64\cacls.exe
              cacls "C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe" /G Everyone:R /C
              3⤵
                PID:1304
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun70.bat" "
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1920
              • C:\Windows\SysWOW64\cacls.exe
                cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                3⤵
                  PID:768
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                    PID:1712
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun98.bat" "
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1708
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                      PID:1620
                    • C:\Windows\SysWOW64\cacls.exe
                      cacls "C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe" /G Everyone:R /C
                      3⤵
                        PID:1672
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun5.bat" "
                      2⤵
                        PID:1900
                        • C:\Windows\SysWOW64\cacls.exe
                          cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                          3⤵
                            PID:1044
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                              PID:580
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun84.bat" "
                            2⤵
                              PID:1536
                              • C:\Windows\SysWOW64\cacls.exe
                                cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                                3⤵
                                  PID:868
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                    PID:960
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun4.bat" "
                                  2⤵
                                    PID:1844
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      3⤵
                                        PID:1696
                                      • C:\Windows\SysWOW64\cacls.exe
                                        cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\\Launch Internet Explorer Browser.lnk" /G Everyone:R /C
                                        3⤵
                                          PID:1292
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun16.bat" "
                                        2⤵
                                          PID:1256
                                          • C:\Windows\SysWOW64\cacls.exe
                                            cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\\Launch Internet Explorer Browser.lnk" /G Everyone:R /C
                                            3⤵
                                              PID:324
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              3⤵
                                                PID:932
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun68.bat" "
                                              2⤵
                                                PID:1668
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                  3⤵
                                                    PID:1596
                                                  • C:\Windows\SysWOW64\cacls.exe
                                                    cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C
                                                    3⤵
                                                      PID:1320

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe

                                                  Filesize

                                                  787KB

                                                  MD5

                                                  c8a8321292a459b0a17fb39a782a5c74

                                                  SHA1

                                                  ef08e68af5b52c468a905a016ddbfb7c5b0a62e6

                                                  SHA256

                                                  a214e3b654bcb6e6142e101b0e89081d44a3a634afa94dc0a620467335b7beb2

                                                  SHA512

                                                  e43131e59ad638445d041753b3711a261134b7a557c10a462ed26c8db72c90814e561013b8b57fc64be5f9339eba875e14f48af54f0218735e6733227c264553

                                                • C:\Users\Admin\AppData\Local\Temp\srun16.bat

                                                  Filesize

                                                  195B

                                                  MD5

                                                  22c653bbd2fe042b430e15c5a5fca33e

                                                  SHA1

                                                  e1cc35ba39274b280279ddd897d71666dd6213b0

                                                  SHA256

                                                  3faddbaf90375fecee929e4fcb8fe96c83620a8391c73cff658ae7607b947231

                                                  SHA512

                                                  70ac4c9d219c831c9e0a1679eacbf8d1738cedd91df5d3bb40c1213845d8c833d84288aba55af97cf618900c7fd0e18eea45d570239e525c5c0e27bac873a311

                                                • C:\Users\Admin\AppData\Local\Temp\srun4.bat

                                                  Filesize

                                                  194B

                                                  MD5

                                                  20ecf857658e4b79ef367219bdb0e32d

                                                  SHA1

                                                  a0361444fbceb2a55e5a35b5dad9e0de2c021faf

                                                  SHA256

                                                  cb2c969a3925ed27120014a7d82bbaafafcae4ebd2da66117a824e662dd66b21

                                                  SHA512

                                                  937f2fbb0bf0f0e16834fedc2929e2ba952dd2e417cc46a59b576da55cd3046cc0225337b54b864254a58391b8ba50c55ec16928c70a2f5701a6fc8f6722b8c1

                                                • C:\Users\Admin\AppData\Local\Temp\srun5.bat

                                                  Filesize

                                                  141B

                                                  MD5

                                                  3474d9ded679aa5570a45b68e0c943b1

                                                  SHA1

                                                  646e91373677bd6f027ec6d43dcc02f739fa3176

                                                  SHA256

                                                  b2b3c163c23fd6c8948bc5f549a8862d64e068bea58327f07034b2f0ae6081a9

                                                  SHA512

                                                  94d306fc2bd74ad968eff6aa24295d693015cbe83fd38434558c1ace2847613352c00b8e958b45f723b88c19293112038bbc3ad03009b71144058b1c2d9c1c63

                                                • C:\Users\Admin\AppData\Local\Temp\srun5.bat

                                                  Filesize

                                                  129B

                                                  MD5

                                                  9386b5e8af81076914c9323154ab33ef

                                                  SHA1

                                                  bac5bca94111b79bf8fe60e9236e051797cc90c0

                                                  SHA256

                                                  3afe9dfbc0693f5b1311227597d4d308aaf57fc6d3ded9013ab14318674d52b8

                                                  SHA512

                                                  5a28ddf90ec9453283da63c21eea9cc3725051cfcea8649536b039c746512cf483b75a48446ac2d682496ab4906f355f5bd98e5a7a174826f8b3061eaa4d8b05

                                                • C:\Users\Admin\AppData\Local\Temp\srun64.bat

                                                  Filesize

                                                  130B

                                                  MD5

                                                  373755967e76e0c55db58eacdc425431

                                                  SHA1

                                                  741f7f507c0c11ee3f11f275fa9a9ee756680477

                                                  SHA256

                                                  7eb723ccd21f93138469baa3177f1e2b7573ab7b84d808860f0f19d6503654f3

                                                  SHA512

                                                  bfaada5fb2aa437929105cd2c523dc308a5d7c917626138397f49f9d2721628e1393b1f1e3122ec8bc2d6c6d67d67c74620900ca84a946acfad5aa983d29335d

                                                • C:\Users\Admin\AppData\Local\Temp\srun68.bat

                                                  Filesize

                                                  191B

                                                  MD5

                                                  83472ced5558de088d0c04bfe46823e8

                                                  SHA1

                                                  1269cb40fee022a0480202d2760dcb10e1013102

                                                  SHA256

                                                  99e05180c66f7e8022477ba73372cf3f4c7a00d8c5926158b183d3e0c9ccf4f3

                                                  SHA512

                                                  d4243c341018588324b05f6372b1a34ccb7e468014216f6092e453231fe40a2e01973e5a63aef00d08112cf58ac3a8fcf4705e9ab94e30db093d4fe2ced2ff3f

                                                • C:\Users\Admin\AppData\Local\Temp\srun70.bat

                                                  Filesize

                                                  130B

                                                  MD5

                                                  b5bc2b04290c13711d4cffecaefbf568

                                                  SHA1

                                                  feaf43402401a1638762a9e8c5647e249604e13c

                                                  SHA256

                                                  e81d6224badd3560083e25c29e8013d801c5d7cac174e9fdb942e806f3ce8113

                                                  SHA512

                                                  9a56c18d5ac835e920adc0081e867f804fb575946eef7d75fa13260bf7c35e8be778204745bb9f906e7135b31f7abcc977115a9af21d1d5ad9f821842ab4f472

                                                • C:\Users\Admin\AppData\Local\Temp\srun84.bat

                                                  Filesize

                                                  130B

                                                  MD5

                                                  91b38496ffc08eebe8f6350baa0d1e31

                                                  SHA1

                                                  486147992ca04e2ca4b92f7ed02670966f9dc25f

                                                  SHA256

                                                  26734d3ed69ff0948f281a6dd465f4ea33580d8ea21267065aa985a902b6f9da

                                                  SHA512

                                                  ea27650db59da61dc860f3615a59f770fbc736cc522d7c2d4a87a90946d51a93514c7bb949af6480a9e496836fa2a98d7491484b8afef0368aebdaf12117568f

                                                • C:\Users\Admin\AppData\Local\Temp\srun98.bat

                                                  Filesize

                                                  142B

                                                  MD5

                                                  9712159e6092ab25caecd7e699a1cbd0

                                                  SHA1

                                                  554fff0650bbc3ecbd0782df17e10d2aa706ac8d

                                                  SHA256

                                                  a53abc1964716f9cd80fc6864efc705c13e1d3dcdcfa0321d66e92cb9645137a

                                                  SHA512

                                                  c238ea3e47c4f599f94f40c029ffc9ff3a7f472b6ef7d48a8fef821562bf6572cd765b7b2119468c4858656d3b8fd06a2280347a864995ebe2bde8b542bb164a

                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  e56f4840834741c054168012e5e35e74

                                                  SHA1

                                                  80e9859f5ba8bb726158f81da9f9cd3b18391a7d

                                                  SHA256

                                                  8f291d44598d6b6594a4a1c6bd16b3124d587473fc0541e49215ed109ba8b23f

                                                  SHA512

                                                  561ce0fbfbce334bbf94794d552f4452bda4ea2f2f56358db81fecb50860f72bb59a520e92ae7e62ab7cb2a46fe79964ce9c38b02f1d3e67888e6c02a63062f0

                                                • C:\Users\Admin\Desktop\Internet Explorer.lnk

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  8532f775e4fc1c3fba078b1d53ec5d58

                                                  SHA1

                                                  ff69dbb22ead6cb6fdb8211d05b7538dd1ed9b38

                                                  SHA256

                                                  71e1d593f375aac2c40da5e1ab6cc80c230b1a3635e50833fc138cb06eacaa2b

                                                  SHA512

                                                  d8850d86d498ca4b644c04bc7eb42b1c215a9ef2ba9f0866cca8b0e802be59bb76fa65afb46b14c8ad1b510add87f13a444bbd74d170b3b730d6fa93be3439fd

                                                • memory/324-87-0x0000000000000000-mapping.dmp

                                                • memory/516-67-0x0000000000000000-mapping.dmp

                                                • memory/580-82-0x0000000000000000-mapping.dmp

                                                • memory/768-70-0x0000000000000000-mapping.dmp

                                                • memory/868-81-0x0000000000000000-mapping.dmp

                                                • memory/932-86-0x0000000000000000-mapping.dmp

                                                • memory/956-61-0x0000000000000000-mapping.dmp

                                                • memory/960-80-0x0000000000000000-mapping.dmp

                                                • memory/1044-84-0x0000000000000000-mapping.dmp

                                                • memory/1256-77-0x0000000000000000-mapping.dmp

                                                • memory/1292-91-0x0000000000000000-mapping.dmp

                                                • memory/1304-66-0x0000000000000000-mapping.dmp

                                                • memory/1320-92-0x0000000000000000-mapping.dmp

                                                • memory/1340-56-0x0000000000000000-mapping.dmp

                                                • memory/1420-55-0x0000000000000000-mapping.dmp

                                                • memory/1536-72-0x0000000000000000-mapping.dmp

                                                • memory/1596-88-0x0000000000000000-mapping.dmp

                                                • memory/1620-69-0x0000000000000000-mapping.dmp

                                                • memory/1668-78-0x0000000000000000-mapping.dmp

                                                • memory/1672-73-0x0000000000000000-mapping.dmp

                                                • memory/1696-90-0x0000000000000000-mapping.dmp

                                                • memory/1708-58-0x0000000000000000-mapping.dmp

                                                • memory/1712-65-0x0000000000000000-mapping.dmp

                                                • memory/1740-62-0x0000000000000000-mapping.dmp

                                                • memory/1784-54-0x00000000762F1000-0x00000000762F3000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/1844-75-0x0000000000000000-mapping.dmp

                                                • memory/1900-64-0x0000000000000000-mapping.dmp

                                                • memory/1920-57-0x0000000000000000-mapping.dmp