Analysis

  • max time kernel
    114s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 23:05

General

  • Target

    0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275.exe

  • Size

    252KB

  • MD5

    4e59d8f8609ab13d66b71b54d12b41a6

  • SHA1

    5a0bb9d6c28cab5d22997f59fc988c90347ebd6a

  • SHA256

    0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275

  • SHA512

    98db081771dea1e29b09671c3aa03840a61107b0a5a46d86b4b7e5eda249172dc67b702ce4326a395173481c116ca20db92f37d89588a6691198a7e3ffcd4cf8

  • SSDEEP

    3072:n9vChraRHgsCFkadLdeAwoswF754RjruCCjzCXAXjHNYUe1IZ0Qv6mZvt:9ISA1mw9+jrK/kAXjHNQ5y6mJ

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275.exe
    "C:\Users\Admin\AppData\Local\Temp\0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275.exe
      C:\Users\Admin\AppData\Local\Temp\0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\notepad.exe
        "C:\Windows\notepad.exe"
        3⤵
          PID:1348
        • C:\Users\Admin\AppData\Local\Temp\0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275.exe
          C:\Users\Admin\AppData\Local\Temp\0d16fcdc7c3e82c25c0b56e77a8d27f36bcecb1021cef67f828bb7be18f2b275.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:904
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:700
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:700 CREDAT:275457 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:948

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\E8CDB1LW.txt

      Filesize

      608B

      MD5

      f3af6646f87fd85802814acf05ce1099

      SHA1

      d8f5e1f8226c1d646739331f8e9fc0d47f4e88f9

      SHA256

      645c64e9432f3ba9afefdcec37aa738a66a8764e3e21b0a9b1b507b3303c2a98

      SHA512

      b88ebf37ac9fddaa60c1c0a87d1a61ef546e16bac0f3b493b4534632c95f7164731053afba28a6629bc633d598fcfda239cce7a28de8bc4b5e9ead718e8f07a2

    • memory/1016-54-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1016-55-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1016-57-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1016-59-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1016-61-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1016-64-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1016-69-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1016-67-0x00000000764D1000-0x00000000764D3000-memory.dmp

      Filesize

      8KB

    • memory/1348-71-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmp

      Filesize

      8KB

    • memory/1532-72-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-73-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-75-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-77-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-79-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-81-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-85-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-86-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1532-89-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1976-68-0x0000000000220000-0x000000000024B000-memory.dmp

      Filesize

      172KB