Analysis

  • max time kernel
    146s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 05:24

General

  • Target

    5f53f5d176fad7cb5ecc66f514397293668150ba5f81f0888c9b50fbdae96044.exe

  • Size

    212KB

  • MD5

    549da97e1b010b8a9f54c566b9be8af6

  • SHA1

    cd0239c1c4022af91bfe5babec57838565e6fef1

  • SHA256

    5f53f5d176fad7cb5ecc66f514397293668150ba5f81f0888c9b50fbdae96044

  • SHA512

    5408cd6466c33911d6dc9e3b77ddfa91e35ab051316cd08ab482516f4b17863bed98dd379e77862af97f872c73ae5008a2d77e8c049582fee3bf44b34910c260

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmD:dHp/urb4A1WdBfg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f53f5d176fad7cb5ecc66f514397293668150ba5f81f0888c9b50fbdae96044.exe
    "C:\Users\Admin\AppData\Local\Temp\5f53f5d176fad7cb5ecc66f514397293668150ba5f81f0888c9b50fbdae96044.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4740
    • \??\c:\Program FilesPP8D67.exe
      "c:\Program FilesPP8D67.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4916 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1364
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4968 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3916
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
        PID:2328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program FilesPP8D67.exe

      Filesize

      36KB

      MD5

      70058a4f7fabdae66b4a4270331e201d

      SHA1

      364bdad825fee497f3c75d3d9a70c497004cbb49

      SHA256

      b02f910c0d2d4fc8c2c5b07727c85b7ee78ac5a2d96c911f9ca0d0f2dc137052

      SHA512

      b2afc6fb3d0d50766607b6991fe575c897467d00b2e63a49d58a93acc7a9944d133e84bc5fd74cb43138bc52b3725d5ff2037bfc33b824815356a110ecc72280

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      7550b85aee4221c59808672005ed8855

      SHA1

      aeb269eff06f518132b9ecea824523fa125ba2d2

      SHA256

      2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

      SHA512

      216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      5c95d2ff9ff2efece50e64988ab55924

      SHA1

      5e0b64557f198d05a57e3af2f5872b1ce1f6f89e

      SHA256

      11ae4fd6a9410cfde7e13021f290b590072b89b033f2101e375473712107c706

      SHA512

      12c9e17d4c3336ea746099e44059f92e5b8a6288dfef5ba9d926bb67f3b06eedacd0933f9b815cbc0ae5a144e06969da8b2305f137b02ed7aa248ea302bdd477

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      edfeac8496fb1a2b30e397e033b4bcb6

      SHA1

      165af5886d27d2fe3a3c67a0370e7d71459a3e10

      SHA256

      f2b39c0e34ee2aa52a6278fb38f3f5a2fc4fe495d8309dbbb6b50c0c31d7e05a

      SHA512

      f455851e1f76c28856dea433100150d5affe6bccf8c8f0cc8d622e8fccafe2164e8ba81460ca7ed551d4d6b444c9e8ef1f80fe99a12a2f9130deaeded0664095

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E9AAFC33-5155-11ED-89AC-4AA92575F981}.dat

      Filesize

      5KB

      MD5

      13201f6e6c791758ead71ea68ea6b80e

      SHA1

      037f7b8a35dfe583252288c4a5b48b9018d1cae6

      SHA256

      c90a48f7c0b55021b3803b6b555bc0d78e5c3e99e437bf2ebf6d40897cb029a1

      SHA512

      8f43e4dbd87939274f1a346d93854f6f453a7fe023177498c865de3964a3a2e3b191481ed020a3ed75dc9cdb59248326c16f9b66c5806ee6af09ed4e16d855de

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EDF61719-5155-11ED-89AC-4AA92575F981}.dat

      Filesize

      5KB

      MD5

      9502efc59c4ab39b35e640993c09d42a

      SHA1

      c49e3a5af41dc568223d5a79a2dc40f6d0983491

      SHA256

      5eb922613435f47d986de48ebd01810819cdfa1621a9aeef91cae0ec258ead6e

      SHA512

      1825dc051bd0b9a1f0de2969ad63d9b753d366e005ed5fe45f8a26776fb684b818956cdc3af4384be55864c227310edc361b53a256fc5ebbb14efb426091c6aa

    • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

      Filesize

      486B

      MD5

      75aedea248a4a3afbe3e5e88d4eb9b04

      SHA1

      28245e65c04f152edbf3324e12b3e1cda6128470

      SHA256

      44cb4871d7b69172761079121e41a1315c6e8ffe2852398e1e1ada41f55e9d5f

      SHA512

      95010ca3537bab40dfac3d21c5802716cb7b3bc62653bdb36ad20fb221c08b7b2292a6ee12a890686605657e43c39bcb0664340e39f65ee1a7f0f1f7a36a49e5

    • \??\c:\Program FilesPP8D67.exe

      Filesize

      36KB

      MD5

      70058a4f7fabdae66b4a4270331e201d

      SHA1

      364bdad825fee497f3c75d3d9a70c497004cbb49

      SHA256

      b02f910c0d2d4fc8c2c5b07727c85b7ee78ac5a2d96c911f9ca0d0f2dc137052

      SHA512

      b2afc6fb3d0d50766607b6991fe575c897467d00b2e63a49d58a93acc7a9944d133e84bc5fd74cb43138bc52b3725d5ff2037bfc33b824815356a110ecc72280

    • memory/2328-139-0x0000000000000000-mapping.dmp

    • memory/4004-134-0x0000000000000000-mapping.dmp