Analysis

  • max time kernel
    171s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 23:51

General

  • Target

    453f3f30de32445aa0541d47727caa65b4428991c1029d4f75353556062c036c.exe

  • Size

    34KB

  • MD5

    0934fd78f4d87d8c7a0c065b7f9bfa60

  • SHA1

    12c36d5a35ace2cc75659c9da534f66395d1a9e5

  • SHA256

    453f3f30de32445aa0541d47727caa65b4428991c1029d4f75353556062c036c

  • SHA512

    ed1fa5a494f85d67c3c4b05a53145a1529bceabe1dbe60dcb52380c329a9214cf2e804f8eaf2eb240a0288385cbf8c828b54239406231b72de429c01fa1cc34c

  • SSDEEP

    768:dFK7mkpMxkOGGGGZzQVGjgeILx2y/ffXayvN2a56F3j33RY9zU0v:ym9xHDQYW0cfPzej3WBU0v

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\453f3f30de32445aa0541d47727caa65b4428991c1029d4f75353556062c036c.exe
    "C:\Users\Admin\AppData\Local\Temp\453f3f30de32445aa0541d47727caa65b4428991c1029d4f75353556062c036c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?LinkID=40587
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    657263b8e135ffdca7f7b92ea290fbbc

    SHA1

    f9879e3e24b3922645b83fc90e774facb8f62661

    SHA256

    d32a9694d483e9a88dc57256f6fc37a209b84e7ae9cb02712e8699f1d39a3368

    SHA512

    c48cce3b4667e06aebe3a71ecc90711490b4a04dcee4c1cc4005e1c63c579caa62c3725055410d41a99cfa32d55a6dafcd535e8c3534e8494b4e6e3a5db974d7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G5RBNMQO.txt

    Filesize

    608B

    MD5

    b4f97e9628cd45d9c4f4378ef75cad66

    SHA1

    e2742b2e649144f7a956e5d8597f15f1f7c128ec

    SHA256

    290bd99a298e12ee8f03ec56f542e08f3ad3a838ca10b957790ea3e865d3bdfa

    SHA512

    714935729675da675ef90b8ec39fd183bad756e598bbebfb4853c79d9c22f5f43f8797f48c4ed33a6858636e44356558ca4986a8ca1c9acd4892f90eaa62bf5a

  • memory/860-54-0x0000000075071000-0x0000000075073000-memory.dmp

    Filesize

    8KB

  • memory/860-55-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB