Analysis

  • max time kernel
    152s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 01:15

General

  • Target

    8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe

  • Size

    567KB

  • MD5

    6e5cbd1e6931541e62486c44359ca910

  • SHA1

    aee21d1b22483ae6894ddb153d21e21aa1b67d53

  • SHA256

    8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9

  • SHA512

    d6538b04af136240486887f801b0fb9be59e5427963fb2d694ac1928456bbc3b72f730548ec7dc2c293d4719921f425b4bd4bf73008128f8254ccd102606d4bb

  • SSDEEP

    12288:Ojb+WVok0w3pY6CY4I7cPD7tyttf1/epQS5lUZ4hFvKBLGjSLfU+6Zu:wXVR0w3pYIu1c/8QSL9nyaSLsM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe
    "C:\Users\Admin\AppData\Local\Temp\8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe"
    1⤵
    • Checks computer location settings
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" www.dnfxiaoyao.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    8d6776475ca38542b9dbe64bb72fe39b

    SHA1

    6d23a3b1d4e4f439c161608d44cfa886f316fd93

    SHA256

    e693edc50280c612b17c433cfb31240c76dd818a44f76d353a63caa56831e1f8

    SHA512

    9283133fef2b578391337e302e714b61e94c71997b47dbb602645ef28e7e518f8027f8a3368bb24471d4b35746aba55d187876f9f90df963e687e008a865a4ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    446B

    MD5

    10d1bdbb992f049aa76ace4c17e71b22

    SHA1

    f2524402a3b3133d36ebb3b4cc1a380de1ee4a6c

    SHA256

    b3a713d7fa4d12b8a6fb279d0f2e5afdd650d4c12eb1613252546422f0a2a30b

    SHA512

    532c18106a0ecb642295e55dde37c946a226bc2e0a85d6004e0bc267cadf42ac49a13672bd3a40d609befd5da10a4a0eee734b95ae500d59369fd1e083b268df

  • memory/4880-132-0x0000000000400000-0x00000000006AF000-memory.dmp

    Filesize

    2.7MB

  • memory/4880-133-0x0000000000400000-0x00000000006AF000-memory.dmp

    Filesize

    2.7MB

  • memory/4880-134-0x0000000000400000-0x00000000006AF000-memory.dmp

    Filesize

    2.7MB

  • memory/4880-135-0x0000000000400000-0x00000000006AF000-memory.dmp

    Filesize

    2.7MB

  • memory/4880-136-0x000000000C2D0000-0x000000000C2D8000-memory.dmp

    Filesize

    32KB