Analysis

  • max time kernel
    154s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 05:24

General

  • Target

    326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a.exe

  • Size

    212KB

  • MD5

    52e52f5654fd9940411c1cffb682e805

  • SHA1

    85954cba4c9b319df9d601e9cd98ffd7bd8a81d9

  • SHA256

    326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a

  • SHA512

    c124ea256904c0b5a0c438a8e38795afe2f5da4cdc49ab4484f1af2a19e7962528a2d6f28542272037403a38abc4d53b75fa434e3a01942f85a2888a1a13ec62

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmP:dHp/urb4A1WdBfo

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a.exe
    "C:\Users\Admin\AppData\Local\Temp\326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • \??\c:\Program Files0CI6D2.exe
      "c:\Program Files0CI6D2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:340993 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1452
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1100
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files0CI6D2.exe

    Filesize

    36KB

    MD5

    766ea2a0302a356ce9cbed1c7c1a6eda

    SHA1

    d41aeead76f032d9907eb667dacc23fb37a97c2f

    SHA256

    4c0db65a6407394e665680f6ed037027277e55df836e9ba87310d292d59616e3

    SHA512

    0279e94f600391211e8fa350f195b04860ac3e59c70780b92d23eb2555f5f9a3556d0c641bee5123171e5e9a58fc7239cc0e1d75efa0545b75b0a237be581853

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{150D9390-5156-11ED-B40B-E20468906380}.dat

    Filesize

    3KB

    MD5

    06989915a4e2f16c9bfdf2f593576a39

    SHA1

    e8e275f211f4b7ea59863ab30c190d78715d871b

    SHA256

    21426764460b03528efab4cc3f11f5becd9d49ae4b3a8f1ef2d68558220e586a

    SHA512

    ebdf7c514209ffc959ae0b1e92df09b683adc1b8434edee6415e43c446a2fb8de2d4705e703df9b807deaf6a27e2f3291e7aebd9c4e9b26942bacb7c7159f2df

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    486B

    MD5

    2802a268585de9367341c9feb8d42af1

    SHA1

    3768f1426ca7dfc4cbfc668832390077dbcb373d

    SHA256

    fe6ba43863acc42a572b08440f12a2bec9af9a5455079d757d257450663a0c53

    SHA512

    d66ef66b096af07635669d4c4e1eea7609c438b535fe52180e05dd2d3732821f68b3c335ac37331e59d24b843079f3ae69d8ae5a503f830dc7bce255a2dc0577

  • memory/1756-56-0x0000000075F81000-0x0000000075F83000-memory.dmp

    Filesize

    8KB