Analysis

  • max time kernel
    115s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 17:09

General

  • Target

    92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe

  • Size

    162KB

  • MD5

    82530b6197a1c4a5e83c8049b7e93e70

  • SHA1

    725d896d3a2a68c9053caf1a5dc693a3cfa6adc8

  • SHA256

    92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999

  • SHA512

    5e3caaf64497d1e1e46c785512edee4d5db185c10d1600c01fdc23bc1866ca943192d23bea8bc0019e38e7a84a3f9b194348d1d1b901400a2f5b93282dc2f024

  • SSDEEP

    3072:CulbGXMwcgrRYYktRSflQ2Kk9OSiXK4j3/dF7ZajG46EgMOEyKgw4PWQ3YxpeuB:9bQhxnKWDb4j30jG9wgw+WQyPB

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe
    "C:\Users\Admin\AppData\Local\Temp\92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://hometown.aol.com.au/imagemarquivos/relatorio.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1072

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          3dcf580a93972319e82cafbc047d34d5

          SHA1

          8528d2a1363e5de77dc3b1142850e51ead0f4b6b

          SHA256

          40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

          SHA512

          98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a819f8cd3a1289f33d65cb1265971006

          SHA1

          15f7dae0e868cf6a8f59380b63906e15e464d7e7

          SHA256

          76667936cd653155b939d63343bc4895131861b55ab087457ac743b24298e281

          SHA512

          45ed2385952b1fd65787d0ecf0f75e95e1368fca4036f60dc210bc056cc61ad3a9a452efdafee5a22f71502f2df2f6833f73be458729648471fedc1f609165c0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LEDLP596.txt

          Filesize

          603B

          MD5

          8fa46e17ebb11cfe4fcac5adf47aadfb

          SHA1

          d9c7f26e182acfc115293c16eb68a93aeccbbc58

          SHA256

          af5a8a1425df7c96a5b3d709fffdeb3509a9f23d320715087d4b8a2f2adcbfb0

          SHA512

          9e28351b4dff38c30aff0b819ad0b79dde5a16f0b1fd139d83f96acc8f8c4f70d28da7166407b82a39e2dec303a386d7ad3d3f9b504e7638c40a671d9c6ff0bf

        • memory/1620-54-0x0000000075F51000-0x0000000075F53000-memory.dmp

          Filesize

          8KB

        • memory/1620-55-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB

        • memory/1620-56-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB