Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2022, 05:24

General

  • Target

    326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a.exe

  • Size

    212KB

  • MD5

    52e52f5654fd9940411c1cffb682e805

  • SHA1

    85954cba4c9b319df9d601e9cd98ffd7bd8a81d9

  • SHA256

    326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a

  • SHA512

    c124ea256904c0b5a0c438a8e38795afe2f5da4cdc49ab4484f1af2a19e7962528a2d6f28542272037403a38abc4d53b75fa434e3a01942f85a2888a1a13ec62

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmP:dHp/urb4A1WdBfo

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a.exe
    "C:\Users\Admin\AppData\Local\Temp\326d63830778be82e426ca5814efe1f8fac8e692cfa3f999f349ab6c14c6043a.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3284
    • \??\c:\Program Files4MS0N6.exe
      "c:\Program Files4MS0N6.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:404
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:404 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3832
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        PID:3804
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
        PID:4684

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files4MS0N6.exe

      Filesize

      36KB

      MD5

      9e9f75ec0851920cc2eb809f4e7316da

      SHA1

      f6452e9078fa318c69bc3c6558a705da48ed1554

      SHA256

      e3326f8036a27e70e8102d34fbb100673d68662f36af658946493d058be62d4f

      SHA512

      643494451cfde2f8c691a3fadf97042af3f0c8b3ed160d4f8894ace5280f224697109c480480a9e81e9d8bacbcf46a3f028d8f31c8e04070ee6e6b21bb335263

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      7550b85aee4221c59808672005ed8855

      SHA1

      aeb269eff06f518132b9ecea824523fa125ba2d2

      SHA256

      2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

      SHA512

      216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      2e83e9e5ae1e79c654902f2e2c82c7fe

      SHA1

      22e0b39d469edcfc2f5184a8e067d106b3b6e359

      SHA256

      29e018757e61b506cb9791ca5a016063f4a66c6defc82dee32106062cd0a4dcf

      SHA512

      0a0819960cb54a06284893cd5daee9898726da7a6981f2bf05eb759c498fcee965f0c9fbf092bad14a45eebd154a237efc1fa85f92547daebfe69bdbd8bc8386

    • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

      Filesize

      486B

      MD5

      2802a268585de9367341c9feb8d42af1

      SHA1

      3768f1426ca7dfc4cbfc668832390077dbcb373d

      SHA256

      fe6ba43863acc42a572b08440f12a2bec9af9a5455079d757d257450663a0c53

      SHA512

      d66ef66b096af07635669d4c4e1eea7609c438b535fe52180e05dd2d3732821f68b3c335ac37331e59d24b843079f3ae69d8ae5a503f830dc7bce255a2dc0577

    • \??\c:\Program Files4MS0N6.exe

      Filesize

      36KB

      MD5

      9e9f75ec0851920cc2eb809f4e7316da

      SHA1

      f6452e9078fa318c69bc3c6558a705da48ed1554

      SHA256

      e3326f8036a27e70e8102d34fbb100673d68662f36af658946493d058be62d4f

      SHA512

      643494451cfde2f8c691a3fadf97042af3f0c8b3ed160d4f8894ace5280f224697109c480480a9e81e9d8bacbcf46a3f028d8f31c8e04070ee6e6b21bb335263