Analysis

  • max time kernel
    82s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 17:39

General

  • Target

    https://teensoft.org/download/FlStudio20.9.2.rar

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://teensoft.org/download/FlStudio20.9.2.rar
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1432
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\FlStudio20.9.2.rar
      2⤵
      • Modifies registry class
      PID:1592
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1504
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x500
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1404

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      3dcf580a93972319e82cafbc047d34d5

      SHA1

      8528d2a1363e5de77dc3b1142850e51ead0f4b6b

      SHA256

      40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

      SHA512

      98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e81026e2518dc0b545936fdb56f6fa2d

      SHA1

      fc0c95e7808b2b9d0fed713d16e04ce6bccf4fc2

      SHA256

      9b3fb6ade6801cdbdfce298fa44efce636eb04efeed763dfdd17ffaab17ca499

      SHA512

      d363f8c26fcd66ec81dd698a06b47f3efb335c0117e015e28139868495343bcee10dc49b52eb2db164fad2ba7fde0c709fd916fa34725e41af0cddd0e6e45cb6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\FlStudio20.9.2.rar.lvzx7ut.partial

      Filesize

      5.4MB

      MD5

      78b0c4acda5ff092ab79911da4a287bb

      SHA1

      f9292b4d5a5ec3685dee35479628a0852e4df5e1

      SHA256

      bc5c7c5e2a1ef4c4accde919b8b7a20ae3ad917d2a9b333cf1e2d0a49dc7ab79

      SHA512

      cd5b31fd3b42d27ad61ab25531f94699924d945b715a3d16efbc2aa3cb4247831cfc7095ad4902170ef3a058a7a5281970efb0d3ae928ff056933eb586f2b5c4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3JUCRGUX.txt

      Filesize

      603B

      MD5

      c9dd8bf98bc866a48a792fb64db19dc9

      SHA1

      88eafbba3279fb3888ae62dc3582105616597763

      SHA256

      f8dbf01c0ac24e6efc4eda7a7fc339e27dfdaef99a196c9614990cc84973f81b

      SHA512

      f874b6ac75e8aaf2d14091e1d3c69cc9ebf4cd7b1de46f6bdcddd1d78fc58fdbe38cb77b996e1869709891edafa2d8762a23becf4989b0dc1170bbdc456c78ae

    • memory/1592-55-0x0000000000000000-mapping.dmp

    • memory/1592-56-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmp

      Filesize

      8KB