Analysis

  • max time kernel
    139s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 16:56

General

  • Target

    2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe

  • Size

    74KB

  • MD5

    90059977d4612ce89ce2d55d3318b10b

  • SHA1

    359c49c294aed1a9f1993f76418c63147bf78cc8

  • SHA256

    2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd

  • SHA512

    e87fdfa94e5ad3de6e0f66c7096aeb220a2a37195542454cab1784e2c9e057f7f549d24b03c5cfdc2fe0e8c3452687958ed2d47edaeb853cc42989304d6ae2b2

  • SSDEEP

    1536:HJb7bstbnXgXSJJnxSWdXiF0x6KIiuLPjVtFi2eUNGPrbg0sc:tObnISJtx7yBiUWlsc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe
    "C:\Users\Admin\AppData\Local\Temp\2a14432b488f09a0b63015ddafe085bb719c6f4e58aff625ab395f40d776abfd.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Roaming\simc.tmp
      C:\Users\Admin\AppData\Roaming\simc.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:932
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c afc9fe2f418b00a0.bat
        3⤵
          PID:1220
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\FMAMzwbd12.bat" "
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1904
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
          3⤵
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\PROGRA~1\INTERN~1\iexplore.exe
            C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
            4⤵
            • Modifies Internet Explorer settings
            PID:872
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:872 CREDAT:275457 /prefetch:2
              5⤵
                PID:320
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
              4⤵
                PID:1324
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
                4⤵
                  PID:1680
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                    5⤵
                      PID:2020
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                      5⤵
                        PID:1780
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?r"" /f
                        5⤵
                          PID:288
                        • C:\Windows\SysWOW64\reg.exe
                          reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
                          5⤵
                            PID:464
                          • C:\Windows\SysWOW64\reg.exe
                            reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
                            5⤵
                              PID:1924
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
                              5⤵
                              • Sets file to hidden
                              • Views/modifies file attributes
                              PID:1820
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib +s +h C:\PROGRA~1\FREERA~1\tmp
                              5⤵
                              • Sets file to hidden
                              • Views/modifies file attributes
                              PID:1704
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
                              5⤵
                                PID:832
                                • C:\Windows\SysWOW64\runonce.exe
                                  "C:\Windows\system32\runonce.exe" -r
                                  6⤵
                                    PID:1080
                                    • C:\Windows\SysWOW64\grpconv.exe
                                      "C:\Windows\System32\grpconv.exe" -o
                                      7⤵
                                        PID:540
                              • C:\Users\Admin\AppData\Roaming\smap.tmp
                                C:\Users\Admin\AppData\Roaming\smap.tmp
                                3⤵
                                  PID:992
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2A1443~1.EXE > nul
                                2⤵
                                • Deletes itself
                                PID:1772

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\PROGRA~1\FREERA~1\1.bat

                              Filesize

                              3KB

                              MD5

                              2b99b7f66b8ebba3071330bcbaccc022

                              SHA1

                              1a79cdcdd4dd3c9e22b45acdbc20a51da5f23e52

                              SHA256

                              3ed44f8ec4dd76cadb989353a1ed4a578d93fbba2eb0997443000384e2fb7f09

                              SHA512

                              03671ec8fbe45df652bddf47141fd017cfd86b25c034608be23eb82035b3e7504765d4fdc9c42e1bbb3de4b132476a5e7156d83fe1982be283c9ea51e9cc8671

                            • C:\PROGRA~1\FREERA~1\1.inf

                              Filesize

                              492B

                              MD5

                              34c14b8530e1094e792527f7a474fe77

                              SHA1

                              f71c4e9091140256b34c18220d1dd1efab1f301d

                              SHA256

                              fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

                              SHA512

                              25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

                            • C:\PROGRA~1\FREERA~1\2.bat

                              Filesize

                              3KB

                              MD5

                              66255a9ad2f8d7deaa5577ca57942871

                              SHA1

                              8003fcd6cf3edd5b053b2765c7178ae90832f370

                              SHA256

                              553e76f0372969152c699aa8f02d0610114492cf1a0386cd425a6b6e861aa197

                              SHA512

                              895951abacd29c28e2970096db9e694626952791f4ff84a77c4f584baae80eb9ef7206fa501d671c6983c9c08cce9016a6a572b65d79fc9f5da39cea9e2d4a04

                            • C:\PROGRA~1\FREERA~1\2.inf

                              Filesize

                              230B

                              MD5

                              f6dcb2862f6e7f9e69fb7d18668c59f1

                              SHA1

                              bb23dbba95d8af94ecc36a7d2dd4888af2856737

                              SHA256

                              c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

                              SHA512

                              eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

                            • C:\PROGRA~1\FREERA~1\4.bat

                              Filesize

                              12.3MB

                              MD5

                              f93dcd1602d374fd6cc76cf71352a12c

                              SHA1

                              cbf9d53b69ce3dfc8f53f586a378ebfbb78c0251

                              SHA256

                              2d06664265c55d997432c57b71e1664ae86e3959ad123934fd775cdb9c413186

                              SHA512

                              b061d7ed4d6d0da5878ceade8b7ebcb4a4749a7c52723813d344089ac6b30ed97850e4df3420f316f599ce93cb35cb1124f32d268b322bf0a711a390245e7494

                            • C:\Users\Admin\AppData\Local\Temp\FMAMzwbd12.bat

                              Filesize

                              150B

                              MD5

                              a46b691be5eee69ff975ca45c311f018

                              SHA1

                              3b9bed578b7554252eb88f900ce398f25d01910a

                              SHA256

                              a29ce165a0fbd6c8dfec21c891ac2a4d385ef1f7b29e92ae46b131e6694628f4

                              SHA512

                              6b8acaa1871b6cb8d68bbabc48146b56f267abb329b9ac2357ac70911fd15bd668ff49260e12d54812fd4f066eed67e311414828ddbc3b9068b8b998edb9c08e

                            • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

                              Filesize

                              2KB

                              MD5

                              3d15f5598c7304d4620c459d16b672d6

                              SHA1

                              d5fd318f2347ef63c062aef5658c5ad5934107c6

                              SHA256

                              30d8d0e43a0eece7b003fbeb6077a07e910afe03199d3d0022fae0d4be94b7f6

                              SHA512

                              09c2b357d31851c209d078e3787407555710b2b837ad94f11f9d113259a7f8bdda199c2cea45ab6338d1a8e4ec94f0cb663f13260c4e47383886cb897e9b9a10

                            • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

                              Filesize

                              691B

                              MD5

                              97f94bb975876582715e95f7751546bb

                              SHA1

                              e1b07092d2454c2d95d8aa76bb44feedae59ce3e

                              SHA256

                              1b6df88776e4b304fe01c9f495e16fb7116a5eacea2579ea07146a6e2324f7c1

                              SHA512

                              7d1823c36abab4723094255fd98bfac8d9797f2e5d1c56930927e872ccb0f175c9046d63aaccb8ef3ebcd79adccb779c095e95cd277b383bf8c4f4ac4f2782f5

                            • C:\Users\Admin\AppData\Roaming\simc.tmp

                              Filesize

                              89KB

                              MD5

                              60a3485b9099f2db25fab138953fb55e

                              SHA1

                              b7417c7f73957cdc0e2ba17014ad20470d9d9190

                              SHA256

                              021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6

                              SHA512

                              f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c

                            • C:\Users\Admin\AppData\Roaming\simc.tmp

                              Filesize

                              89KB

                              MD5

                              60a3485b9099f2db25fab138953fb55e

                              SHA1

                              b7417c7f73957cdc0e2ba17014ad20470d9d9190

                              SHA256

                              021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6

                              SHA512

                              f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c

                            • C:\Users\Admin\AppData\Roaming\smap.tmp

                              Filesize

                              36.1MB

                              MD5

                              7628f31a6da0842090b8e5c443cf6818

                              SHA1

                              144abeb64362dc272e6c516a8db4927b5be50e5b

                              SHA256

                              e7d0b5de15c507014417f6e21ab72228ffe5059528a6793182174830b6bfaa38

                              SHA512

                              c97e93481d797d206fa346ec4584ae28ef187fd9b8b3274d4bb3084f51f383f85d1dccf5986e3c15430ba78b256df3c63e66ecfe9322533e2e22bbca6d9bebde

                            • C:\Users\Admin\AppData\Roaming\smap.tmp

                              Filesize

                              28.0MB

                              MD5

                              fdf428922322c5e371b44d7ec595e046

                              SHA1

                              404d5f69f001daf61acce19aef4778add3984ab2

                              SHA256

                              59a50acf93ad54d786a692467a96c0820c4fea2d4ca5b5ff801e0f3ef1b498ba

                              SHA512

                              f28375a581517da97967a2418ffa9aeb0be15bb2daf7d52c0c036eb3d7e7ea8a295b6d748486cf86578bc912fe1f884e904fa9bb0c77483d8222e426f985f24d

                            • \Users\Admin\AppData\Roaming\simc.tmp

                              Filesize

                              89KB

                              MD5

                              60a3485b9099f2db25fab138953fb55e

                              SHA1

                              b7417c7f73957cdc0e2ba17014ad20470d9d9190

                              SHA256

                              021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6

                              SHA512

                              f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c

                            • \Users\Admin\AppData\Roaming\simc.tmp

                              Filesize

                              89KB

                              MD5

                              60a3485b9099f2db25fab138953fb55e

                              SHA1

                              b7417c7f73957cdc0e2ba17014ad20470d9d9190

                              SHA256

                              021f89fd1ef5fdea077b67c849f34391638865bf5ac941631d8cdffbe4fbbdc6

                              SHA512

                              f053a0a3736ed4a5a216b5ae0d6c3e572b51260db09bca5cf793fed0a94498d09082b0e4b79174de05d0220bae7719ce66db811c6bbd368997e905f18b0bac0c

                            • \Users\Admin\AppData\Roaming\smap.tmp

                              Filesize

                              35.9MB

                              MD5

                              b7876ee0f2b13624869dbcc593a6cc91

                              SHA1

                              3097cfafe0795879c7209bfd398de78a270881c9

                              SHA256

                              5a5d2549a15b7ace90cd21f5087be431696716e48fdd8a0b2d39fbf81239aef0

                              SHA512

                              cf9cf1ea6f04fb994f31f3ec4f750991fe8ffa111a8c345480668ffaa562ef08a87eac2182196af9b6f0157c7611334b324fb3d5aa09c0de2eb2b8e07ed3a35b

                            • \Users\Admin\AppData\Roaming\smap.tmp

                              Filesize

                              36.1MB

                              MD5

                              7628f31a6da0842090b8e5c443cf6818

                              SHA1

                              144abeb64362dc272e6c516a8db4927b5be50e5b

                              SHA256

                              e7d0b5de15c507014417f6e21ab72228ffe5059528a6793182174830b6bfaa38

                              SHA512

                              c97e93481d797d206fa346ec4584ae28ef187fd9b8b3274d4bb3084f51f383f85d1dccf5986e3c15430ba78b256df3c63e66ecfe9322533e2e22bbca6d9bebde

                            • memory/872-71-0x000007FEFC5A1000-0x000007FEFC5A3000-memory.dmp

                              Filesize

                              8KB

                            • memory/872-75-0x0000000002630000-0x0000000002640000-memory.dmp

                              Filesize

                              64KB

                            • memory/992-94-0x0000000000910000-0x0000000000919000-memory.dmp

                              Filesize

                              36KB

                            • memory/1492-55-0x0000000000050000-0x000000000008C000-memory.dmp

                              Filesize

                              240KB

                            • memory/1492-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

                              Filesize

                              8KB

                            • memory/1492-56-0x0000000000020000-0x0000000000023000-memory.dmp

                              Filesize

                              12KB

                            • memory/1492-66-0x0000000000050000-0x000000000008C000-memory.dmp

                              Filesize

                              240KB

                            • memory/1904-83-0x0000000000270000-0x0000000000279000-memory.dmp

                              Filesize

                              36KB

                            • memory/1904-82-0x0000000000270000-0x0000000000279000-memory.dmp

                              Filesize

                              36KB