Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 14:00

General

  • Target

    72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe

  • Size

    212KB

  • MD5

    075f7995c386dbf1d71ad15967b5c8e2

  • SHA1

    fde5ee1c186a68a5a1f929a569ebe241cfe95798

  • SHA256

    72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a

  • SHA512

    1a1f84d854939811ded3e777b0ec74028ed08b4835513df3854dd2a155e88dbb6a30be2cb26ace6ab6e86e152f928d4fd531ce7da1e172ca9771308e6ffe36d2

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmb:dHp/urb4A1WdBf0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe
    "C:\Users\Admin\AppData\Local\Temp\72377ded683aab57ead77ca82b187fe190bb75f4ab84a128a61b3723334d974a.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1208
    • \??\c:\Program FilesO58C6T.exe
      "c:\Program FilesO58C6T.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:612
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1020
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:540
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program FilesO58C6T.exe

    Filesize

    36KB

    MD5

    41acfb37ce0959563b0439647abd21a5

    SHA1

    f5022e711a652883c21354788930eeb765c707b0

    SHA256

    4a7a0593957d876a43d29a95f53e7a65f53b89105840a6f3c262bfb7a4a20200

    SHA512

    7e7423627929d9905c3baf99bcd66f03d8a345aac3b6c6aad63402ff55e35f3c443282991e8403501522c8c835adde9fd7048139aa92bd4b2094e6488d7fabf0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0E897991-5E07-11ED-B68C-6A6CB2F85B9F}.dat

    Filesize

    5KB

    MD5

    92ceca8347fb3b77d981841a00f406f8

    SHA1

    8c8fa1fcbd30e7caec6c3e8645b70a7152fa99ad

    SHA256

    0eb5128a1e32be1746e93c963d484637310030cfe48d31f5c6bb296e650bce8f

    SHA512

    d43fc822bbb9db8ee1c8f2d762487e3422e5db4c7345cbf8e0bb95740c35bec76a86583da5ef06ee1154e7bb65343351a1eb2c3f938644ce47f58f88b8e78ec7

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    486B

    MD5

    69bcd5056dd8c7038d5f728d28ab8347

    SHA1

    1d9fe83572c78eac695c91aad875bfc6250c5906

    SHA256

    8c91f52aa91d23e375f3e850a485e3ae77ab5db23fa4815cb8fd759f57193a97

    SHA512

    1836ff11af3b80b01f8d3fb81efe52d846f7d9656a10847e40b3da0ad3cfcb49369572843769d5033e52cbc1db6f9bdfeff480db5191a1f5c12a5f91ab55c4cf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6XFTCWTD.txt

    Filesize

    603B

    MD5

    d6eace6608180ff3f76ac2429ad2ea9f

    SHA1

    f48ad535a221b74da5f69290c67cf75667a0f51d

    SHA256

    d3b462fde2201a5b181bed88492543dec7f2291d0a92f6b68e20ff7a459a7209

    SHA512

    fd224070d72180e64abdf8c18695af3255eb5805a2099511cea4d9a76e91302f582d6940920aaa811a39f61ce1b9ff16291a6525f85e7d738e02eef68dab5346

  • memory/1208-56-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB