Analysis

  • max time kernel
    141s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 15:56

General

  • Target

    cdc6e717cb9f46e729594feb91200b3cd90a53e91c09790229c16b8cd06b3a1f.exe

  • Size

    69KB

  • MD5

    0d19f273b161ddac5e37002296625540

  • SHA1

    d413b01f7f9c280286e28a84543476a7941119b9

  • SHA256

    cdc6e717cb9f46e729594feb91200b3cd90a53e91c09790229c16b8cd06b3a1f

  • SHA512

    be414568bdb088911434a36a5a3980e68a579c6cda7cdf9f91a4a408a349a87b1645bbc501788e464adc2bbca3dd41b4903a8403df811d2829efac04a761a68e

  • SSDEEP

    1536:dOplpgYQmvKfP9dqzMLon9/zFxhbISz5VffMOZS9da2m:dOp/gYlvK6zMLo9/zF9zPfBSjS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdc6e717cb9f46e729594feb91200b3cd90a53e91c09790229c16b8cd06b3a1f.exe
    "C:\Users\Admin\AppData\Local\Temp\cdc6e717cb9f46e729594feb91200b3cd90a53e91c09790229c16b8cd06b3a1f.exe"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\FONTCACHE.DAT",#1
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      PID:1400
    • C:\Windows\SysWOW64\cmd.exe
      /s /c "for /L %i in (1,1,100) do (del /F "C:\Users\Admin\AppData\Local\Temp\CDC6E7~1.EXE" & ping localhost -n 2 & if not exist "C:\Users\Admin\AppData\Local\Temp\CDC6E7~1.EXE" Exit 1)"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\SysWOW64\PING.EXE
        ping localhost -n 2
        3⤵
        • Runs ping.exe
        PID:1204
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:908
    • C:\Windows\system32\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:264 WinX:0 WinY:0 IEFrame:0000000000000000
      2⤵
      • Modifies Internet Explorer settings
      PID:1956
    • C:\Windows\system32\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:65800 WinX:0 WinY:0 IEFrame:0000000000000000
      2⤵
      • Modifies Internet Explorer settings
      PID:1076
    • C:\Windows\system32\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:65800 WinX:0 WinY:0 IEFrame:0000000000000000
      2⤵
      • Modifies Internet Explorer settings
      PID:1416
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\FONTCACHE.DAT

    Filesize

    54KB

    MD5

    cdfb4cda9144d01fb26b5449f9d189ff

    SHA1

    315863c696603ac442b2600e9ecc1819b7ed1b54

    SHA256

    f5785842682bc49a69b2cbc3fded56b8b4a73c8fd93e35860ecd1b9a88b9d3d8

    SHA512

    41d6ec0c66c51873cdba8bcd0e35f6237b8dddab843a9d7ae4e2639282596c1f0a18a932bc0a8ab3f60972e4ef1636d590b4e25cb213e66bb20c396192f7d4e0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\P7DP9CBO.txt

    Filesize

    608B

    MD5

    e53b7697f5b20a236b9c5db73e7198cc

    SHA1

    0fc2aa693893b0714da44b4183798391db8638d8

    SHA256

    2513674adfae75cdf7da463a898c2ff46e8291aad1b10c4f7981aa80c0cfae94

    SHA512

    53676d700f4fd3de51d70e12d94c0539beb66b3eb546fc0ab178b0913b7318a30595ab82b5ee4eeb647933ae3c6d75b4110d4163f2710eefdc40b0d686fd1d54

  • \Users\Admin\AppData\Local\FONTCACHE.DAT

    Filesize

    54KB

    MD5

    cdfb4cda9144d01fb26b5449f9d189ff

    SHA1

    315863c696603ac442b2600e9ecc1819b7ed1b54

    SHA256

    f5785842682bc49a69b2cbc3fded56b8b4a73c8fd93e35860ecd1b9a88b9d3d8

    SHA512

    41d6ec0c66c51873cdba8bcd0e35f6237b8dddab843a9d7ae4e2639282596c1f0a18a932bc0a8ab3f60972e4ef1636d590b4e25cb213e66bb20c396192f7d4e0

  • memory/996-54-0x0000000001E30000-0x0000000001E40000-memory.dmp

    Filesize

    64KB

  • memory/1400-57-0x0000000075E11000-0x0000000075E13000-memory.dmp

    Filesize

    8KB

  • memory/1400-62-0x0000000010010000-0x000000001001B000-memory.dmp

    Filesize

    44KB

  • memory/1400-63-0x0000000010010000-0x000000001001B000-memory.dmp

    Filesize

    44KB

  • memory/1400-61-0x0000000010010000-0x000000001001B000-memory.dmp

    Filesize

    44KB

  • memory/1416-68-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

    Filesize

    8KB