Analysis

  • max time kernel
    91s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 08:25

General

  • Target

    d5266fb1913dd52ec65b1a497e53fafe12a36c0dff522a8c112c9d95bab3bfb2.exe

  • Size

    32KB

  • MD5

    935dfef3b95c402bdeff668ce3acdd80

  • SHA1

    3f7bdd0419e2fdcfa95bea826049794d73aca9dc

  • SHA256

    d5266fb1913dd52ec65b1a497e53fafe12a36c0dff522a8c112c9d95bab3bfb2

  • SHA512

    c842c178073a6425f1c2b16f433d27edd3e46b4ea91f051466096e1ff58ef8bd42e66be9708152b6a1a9a564c30f53a13f3c9707a68ea01b6bc67fe2bcb3465b

  • SSDEEP

    768:i4vrFvWfgCkboUsVwyISUTjPXWcZTPw9jNbhyHVBH:i4vM3qF4vzUT7mU89jNbAHVBH

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5266fb1913dd52ec65b1a497e53fafe12a36c0dff522a8c112c9d95bab3bfb2.exe
    "C:\Users\Admin\AppData\Local\Temp\d5266fb1913dd52ec65b1a497e53fafe12a36c0dff522a8c112c9d95bab3bfb2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4548
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4548 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4596

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          5ddb1febcd291eb59d3d67d24a05bfd0

          SHA1

          fe957affe27cb991f332e7f5c86d3a15359bd3b9

          SHA256

          ec45a385c906b3d925ebbe6532d10adec9a14c1733c756c64db5133bd9d88dcb

          SHA512

          62d00893402fae125ae3428da2495b0eb864b125f975cd887f894f7298a4a86f361cf50aaa7c9b69f3dcb734a950c43472778ea4062b3146c3de5623d08dcd21

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          aad6cfe2e6c16cc3f41aa34a50b70b0b

          SHA1

          c963e7a5f3512c9770f17c3fb7e722b2194dc1d4

          SHA256

          bf1a010e9fd643837a0b03e18781589da06e81b928a810e5f426e0ddff481cee

          SHA512

          895f4cacc9f2d40b510703448a8ec46f316da455aa491e14b543a0775dbdfc60e81909974314dded79665938c36f0c5ff50f690e674cca37b528d496ba674292

        • memory/4876-132-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB