Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2022 04:52

General

  • Target

    4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98.exe

  • Size

    252KB

  • MD5

    427e35a6495f37a96d047f1c4ae1ac86

  • SHA1

    d1f983fc45f1d51216a61ee8a3c23e1c1fd1c7d5

  • SHA256

    4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98

  • SHA512

    11ec58af55a6741d0cfcba5554ecc21cd1c2afbed06a1bd55aa4af631bd201c16755f52048819194e00022dc9d3b7c58327f46abaa5cce2b88c3338a457caf1a

  • SSDEEP

    3072:KCtFBrDkiap75+blxPCMwy6K9MHecBQ41pBys8:KCtFtDg9sSS0HeQ8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98.exe
    "C:\Users\Admin\AppData\Local\Temp\4b5de56e33e310e79076fc2a4fe182bc30284608d8029285b09d0b12b7eb2e98.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Roaming\simc.tmp
      C:\Users\Admin\AppData\Roaming\simc.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c afc9fe2f418b00a0.bat
        3⤵
          PID:1740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\FMAMzwbd12.bat" "
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
          3⤵
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\PROGRA~1\INTERN~1\iexplore.exe
            C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:432
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:2
              5⤵
                PID:1600
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
              4⤵
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:1828
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1076
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:1564
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
                5⤵
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                PID:1132
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?r"" /f
                5⤵
                  PID:1756
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
                  5⤵
                    PID:1412
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
                    5⤵
                      PID:2040
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
                      5⤵
                      • Sets file to hidden
                      • Views/modifies file attributes
                      PID:1932
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib +s +h C:\PROGRA~1\FREERA~1\tmp
                      5⤵
                      • Sets file to hidden
                      • Views/modifies file attributes
                      PID:1820
                    • C:\Windows\SysWOW64\rundll32.exe
                      rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
                      5⤵
                        PID:2036
                        • C:\Windows\SysWOW64\runonce.exe
                          "C:\Windows\system32\runonce.exe" -r
                          6⤵
                            PID:1552
                            • C:\Windows\SysWOW64\grpconv.exe
                              "C:\Windows\System32\grpconv.exe" -o
                              7⤵
                                PID:1740
                      • C:\Users\Admin\AppData\Roaming\smap.tmp
                        C:\Users\Admin\AppData\Roaming\smap.tmp
                        3⤵
                        • Executes dropped EXE
                        PID:1180
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4B5DE5~1.EXE > nul
                      2⤵
                      • Deletes itself
                      PID:1988

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\PROGRA~1\FREERA~1\1.bat

                    Filesize

                    3KB

                    MD5

                    2b99b7f66b8ebba3071330bcbaccc022

                    SHA1

                    1a79cdcdd4dd3c9e22b45acdbc20a51da5f23e52

                    SHA256

                    3ed44f8ec4dd76cadb989353a1ed4a578d93fbba2eb0997443000384e2fb7f09

                    SHA512

                    03671ec8fbe45df652bddf47141fd017cfd86b25c034608be23eb82035b3e7504765d4fdc9c42e1bbb3de4b132476a5e7156d83fe1982be283c9ea51e9cc8671

                  • C:\PROGRA~1\FREERA~1\1.inf

                    Filesize

                    492B

                    MD5

                    34c14b8530e1094e792527f7a474fe77

                    SHA1

                    f71c4e9091140256b34c18220d1dd1efab1f301d

                    SHA256

                    fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

                    SHA512

                    25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

                  • C:\PROGRA~1\FREERA~1\2.bat

                    Filesize

                    3KB

                    MD5

                    66255a9ad2f8d7deaa5577ca57942871

                    SHA1

                    8003fcd6cf3edd5b053b2765c7178ae90832f370

                    SHA256

                    553e76f0372969152c699aa8f02d0610114492cf1a0386cd425a6b6e861aa197

                    SHA512

                    895951abacd29c28e2970096db9e694626952791f4ff84a77c4f584baae80eb9ef7206fa501d671c6983c9c08cce9016a6a572b65d79fc9f5da39cea9e2d4a04

                  • C:\PROGRA~1\FREERA~1\2.inf

                    Filesize

                    230B

                    MD5

                    f6dcb2862f6e7f9e69fb7d18668c59f1

                    SHA1

                    bb23dbba95d8af94ecc36a7d2dd4888af2856737

                    SHA256

                    c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

                    SHA512

                    eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

                  • C:\PROGRA~1\FREERA~1\4.bat

                    Filesize

                    12.3MB

                    MD5

                    bfb615a3ca53900b21a90b2e56a11621

                    SHA1

                    f48f5bc10a31185440708e17cd006265d6431c2e

                    SHA256

                    9f4319171d80bd173e12e08a049c4fac850197e2ad9602aea074a83d4b16f64a

                    SHA512

                    aa7eab7ef650340d6bf1d877da8145dda93b32bc93c80cde51a0d82522bf0cacf0d29589c411e6d202f83cfc0dbea62b94b239bba2b35fac271e8ab7ffb46272

                  • C:\Users\Admin\AppData\Local\Temp\FMAMzwbd12.bat

                    Filesize

                    150B

                    MD5

                    a46b691be5eee69ff975ca45c311f018

                    SHA1

                    3b9bed578b7554252eb88f900ce398f25d01910a

                    SHA256

                    a29ce165a0fbd6c8dfec21c891ac2a4d385ef1f7b29e92ae46b131e6694628f4

                    SHA512

                    6b8acaa1871b6cb8d68bbabc48146b56f267abb329b9ac2357ac70911fd15bd668ff49260e12d54812fd4f066eed67e311414828ddbc3b9068b8b998edb9c08e

                  • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

                    Filesize

                    2KB

                    MD5

                    3d15f5598c7304d4620c459d16b672d6

                    SHA1

                    d5fd318f2347ef63c062aef5658c5ad5934107c6

                    SHA256

                    30d8d0e43a0eece7b003fbeb6077a07e910afe03199d3d0022fae0d4be94b7f6

                    SHA512

                    09c2b357d31851c209d078e3787407555710b2b837ad94f11f9d113259a7f8bdda199c2cea45ab6338d1a8e4ec94f0cb663f13260c4e47383886cb897e9b9a10

                  • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

                    Filesize

                    691B

                    MD5

                    97f94bb975876582715e95f7751546bb

                    SHA1

                    e1b07092d2454c2d95d8aa76bb44feedae59ce3e

                    SHA256

                    1b6df88776e4b304fe01c9f495e16fb7116a5eacea2579ea07146a6e2324f7c1

                    SHA512

                    7d1823c36abab4723094255fd98bfac8d9797f2e5d1c56930927e872ccb0f175c9046d63aaccb8ef3ebcd79adccb779c095e95cd277b383bf8c4f4ac4f2782f5

                  • C:\Users\Admin\AppData\Roaming\simc.tmp

                    Filesize

                    89KB

                    MD5

                    73d7f1deb9b0c07394fabcdee5e94f30

                    SHA1

                    8d5b3e57aa38f90d52a6e715be2ae1599ca1b6da

                    SHA256

                    94ee739dc94d50fbe2fba725f73fc5fd057240170557a5cd7f3463688479864a

                    SHA512

                    cbac201973d8286b02753f94d9ed889a88fa8995d66aacc2886e480b2f73d1320a4f40f28932bf345e9cfcb4ba610ce6a5b966ca14b54b2389e40d2d8d5aa77a

                  • C:\Users\Admin\AppData\Roaming\simc.tmp

                    Filesize

                    89KB

                    MD5

                    73d7f1deb9b0c07394fabcdee5e94f30

                    SHA1

                    8d5b3e57aa38f90d52a6e715be2ae1599ca1b6da

                    SHA256

                    94ee739dc94d50fbe2fba725f73fc5fd057240170557a5cd7f3463688479864a

                    SHA512

                    cbac201973d8286b02753f94d9ed889a88fa8995d66aacc2886e480b2f73d1320a4f40f28932bf345e9cfcb4ba610ce6a5b966ca14b54b2389e40d2d8d5aa77a

                  • C:\Users\Admin\AppData\Roaming\smap.tmp

                    Filesize

                    37.4MB

                    MD5

                    90a74b26176df3e91c75496d8656e2ee

                    SHA1

                    837c5533f9e5fcfb05cfb45f50db63a4e4e1f1b8

                    SHA256

                    5680412130edde0e62524b993625305774eabe5824a1205591748baabf5b1286

                    SHA512

                    c20ca8f196bcd1d2d32b78f3d3e6b56b7572eabe5065438451088794ace009e60ca3788c8a60ba355d6781950460b623613d990a4ec84bafb934a2eb37cf8dd6

                  • C:\Users\Admin\AppData\Roaming\smap.tmp

                    Filesize

                    35.6MB

                    MD5

                    65d4c2fd64c37156c05446815ce2b8d7

                    SHA1

                    965ee5ea819b08b906fccffaa519f9a79d1f4279

                    SHA256

                    e602d12427ad7d3701ec323c33607ee17a266db9e60b3ed6836737846ca16741

                    SHA512

                    d3a40d6f42ae91b0d631325418bc7443a9d0457efb886c6e0f03d2fda180c32aea9282325108505224b12dd7eb97fd10f92242d19dfda9ecbbbf2c739c2fb208

                  • \Users\Admin\AppData\Roaming\simc.tmp

                    Filesize

                    89KB

                    MD5

                    73d7f1deb9b0c07394fabcdee5e94f30

                    SHA1

                    8d5b3e57aa38f90d52a6e715be2ae1599ca1b6da

                    SHA256

                    94ee739dc94d50fbe2fba725f73fc5fd057240170557a5cd7f3463688479864a

                    SHA512

                    cbac201973d8286b02753f94d9ed889a88fa8995d66aacc2886e480b2f73d1320a4f40f28932bf345e9cfcb4ba610ce6a5b966ca14b54b2389e40d2d8d5aa77a

                  • \Users\Admin\AppData\Roaming\simc.tmp

                    Filesize

                    89KB

                    MD5

                    73d7f1deb9b0c07394fabcdee5e94f30

                    SHA1

                    8d5b3e57aa38f90d52a6e715be2ae1599ca1b6da

                    SHA256

                    94ee739dc94d50fbe2fba725f73fc5fd057240170557a5cd7f3463688479864a

                    SHA512

                    cbac201973d8286b02753f94d9ed889a88fa8995d66aacc2886e480b2f73d1320a4f40f28932bf345e9cfcb4ba610ce6a5b966ca14b54b2389e40d2d8d5aa77a

                  • \Users\Admin\AppData\Roaming\smap.tmp

                    Filesize

                    38.1MB

                    MD5

                    5ef48ef01976d5a805550acdd8df9261

                    SHA1

                    1c439074b8cfc7c582915dd676283b853d45418f

                    SHA256

                    3f9c544f3d6f51291ae90f83c9336d365860837646d3a2487594998ee516a8f9

                    SHA512

                    b10065212374258d08693b08a2ededbd385988d4fab2d58cfcc3a87c1aa18d66481d08129dc337178a67e20a9f288834527c51eaeebc3ddc8e7ba98004cb7d41

                  • \Users\Admin\AppData\Roaming\smap.tmp

                    Filesize

                    34.1MB

                    MD5

                    6b9af760ecbdc36db4bd77cec29a0c19

                    SHA1

                    d28a4b2299a9af6a31341e1169ecfe5bc0e28b02

                    SHA256

                    dc133b71b0a60ee077a509ecf5f94d9af75793aa65587293484e37b289d5b254

                    SHA512

                    db802f71acab29741bf3faeaabfe425f35bcee769e830f042404707bcb056633bd4402658f0fc3b87cb27b50566d8d6c1450587f0dbf7a9c5cbf206ea7816646

                  • memory/1180-89-0x0000000001310000-0x0000000001319000-memory.dmp

                    Filesize

                    36KB

                  • memory/1984-86-0x0000000000130000-0x0000000000139000-memory.dmp

                    Filesize

                    36KB

                  • memory/1984-88-0x0000000000130000-0x0000000000139000-memory.dmp

                    Filesize

                    36KB

                  • memory/2028-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

                    Filesize

                    8KB

                  • memory/2028-65-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB

                  • memory/2028-55-0x0000000000400000-0x000000000043F000-memory.dmp

                    Filesize

                    252KB