Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 15:11

General

  • Target

    203d55a92361ef7d5092e8e2c7b46990c91acdc06f975f3185cd762eefb66a79.exe

  • Size

    48KB

  • MD5

    0cfd7b9daaeeccf65756bd2a5a383bb0

  • SHA1

    fbb15fe5852c30f3f2c89cd298d1318aa818290b

  • SHA256

    203d55a92361ef7d5092e8e2c7b46990c91acdc06f975f3185cd762eefb66a79

  • SHA512

    daf9423aab383a8fc4fbc7732802c45a00f557b92d6014f9197349e8a57d5001f8a9423380826766d000265c59000a51c41b1ad1896563394b660d6a63e3f61a

  • SSDEEP

    768:hMTLFoLgpF2jD6JNDVUG93jMyPIGjAHlC5GtE:h6Z/pk+cGtjP5OsAa

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\203d55a92361ef7d5092e8e2c7b46990c91acdc06f975f3185cd762eefb66a79.exe
    "C:\Users\Admin\AppData\Local\Temp\203d55a92361ef7d5092e8e2c7b46990c91acdc06f975f3185cd762eefb66a79.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://login.aliexpress.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    4a0db3880bd46dd2ca4a83364e6ce27d

    SHA1

    ce726e966b0ff0e07b34c632764aa3ac50c14470

    SHA256

    323b96524c9abfbed448f22a500694272846ef51f6f023d38e5848bcdcb20725

    SHA512

    112e6f5a673b7b1bc0e1a2eb5b08457c5fa5c593a02e1e4f97058f596cdb9f2f621a38ecdbaf674339233b380112529d8d6c597b3c4f4a945ec3788b5106a3f9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X53KPJUS.txt

    Filesize

    598B

    MD5

    d3e8a298bd3a4cbb5e7be6bc9a715502

    SHA1

    22aa858ac4bb19d689171725c586bd7a4e4e31de

    SHA256

    36ddf2f0905246bcfbaa9e562af1b0a4cff25c4d53027acb265bc40b071f2ad9

    SHA512

    8b6329d58cb9b9ed279e7abafec8c244a1cd5fc9f52262f2ab8d398fa835f1080c1a835133c34e0d0f405910a2b7789283b3223d78869bc42e0e5eba6697a046

  • memory/1992-54-0x0000000076141000-0x0000000076143000-memory.dmp

    Filesize

    8KB

  • memory/1992-55-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1992-56-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB