Analysis

  • max time kernel
    143s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 07:08

General

  • Target

    5f746936f55bd660b1ad904019855cc018143b9faafab65d0d4d260894d4ee8a.exe

  • Size

    212KB

  • MD5

    5245490dd86f544ad288db16fb2241bf

  • SHA1

    6337b24538e0a54be918e52a38db6367c7b875a5

  • SHA256

    5f746936f55bd660b1ad904019855cc018143b9faafab65d0d4d260894d4ee8a

  • SHA512

    6699863a582537d763e0f01446787a03b5f7a3d37dec445d8c52630b2538a9cebea62a4dbc4f3da659d6a94a3efbcbc3af707364cb7033fe229afa05ad301eb6

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmC:dHp/urb4A1WdBfl

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f746936f55bd660b1ad904019855cc018143b9faafab65d0d4d260894d4ee8a.exe
    "C:\Users\Admin\AppData\Local\Temp\5f746936f55bd660b1ad904019855cc018143b9faafab65d0d4d260894d4ee8a.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:780
    • \??\c:\Program FilesTUA389.exe
      "c:\Program FilesTUA389.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1636
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1164 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1160
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program FilesTUA389.exe

    Filesize

    36KB

    MD5

    841002eac91cf2923a7b74717ad9fa97

    SHA1

    34f2b6213952cb827c574ff61b1fd129c090d254

    SHA256

    32a3c17c9bb49b98a0267a9b1138a4ea76720510ee550dfbd617bdf87ff4eaae

    SHA512

    ff9c9c7302ebc4e170e8963cda1cd55f6edf198f36fb4e390af47fee396e117a07fb02c572af88564f1108eb3e73f4755c73bd145aeeb817c0dd526d7ac29221

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{08E235A1-518B-11ED-965B-E20468906380}.dat

    Filesize

    5KB

    MD5

    fb9de7a941d6db0f61c83dd0e47a7786

    SHA1

    b04e4b2d71baa37fbb9d2c85c24162d9251b04f7

    SHA256

    1847edbf636afa1e5d517afe26977f5304dce44741c16bd0355292d25dd90554

    SHA512

    bd6ed2ad6e6297b603fcd24073395ce53e8f864eafb3c8feaec3bd19d3285c7b7276f4a1086be7408b747eaf965856ab7380b0368b294d3b62718cd0eb57dd9a

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    486B

    MD5

    ca62f5987432eb3d500c71fc463d0d58

    SHA1

    24bbdaf91795bc2342e6e54acab14c9e725ac6af

    SHA256

    e77fbab91ea2f1fb964365458dabb5d9ca70a83d004d527b717030f7601e812e

    SHA512

    9ca5cc5547410b75e2d1ab91e72f88dfdb7b72b552111d6e8050dc0c0ee6d1d1b8947211ee2d69a0ea1264c58c1fcfcad79923e23ff1bbbf64adcc1a0e1a3727

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TJF8UBEP.txt

    Filesize

    608B

    MD5

    472cbb7266a2c86574b5552ae68a5eb2

    SHA1

    0555f48e25c9cce7f8f093ca68dafaa733871111

    SHA256

    a967ffeac39aeea0650cd3be8350ae745c2990ff6452a0406c677dafd42f73ad

    SHA512

    e4bfe3df98e6732d2f3ccd812ab0b4001c1360f3fbcb706ea69d554cbc3135ba0655a58767a4a256f56572d20f837a282426194930781679155c43bda0784914

  • memory/780-56-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB