Analysis

  • max time kernel
    103s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 13:29

General

  • Target

    862fd2d95e0953037fa01b828db52c2f9aead801236a4c566a735de05119a21c.exe

  • Size

    800KB

  • MD5

    2d07681ddf6af723c20def42d3165d60

  • SHA1

    a14aa948c8fa080171d11fce3fa8513f9b20c675

  • SHA256

    862fd2d95e0953037fa01b828db52c2f9aead801236a4c566a735de05119a21c

  • SHA512

    a4cb0754d05696b05c883c37c33d2bdc2bbed2474164fd93b30390bbda1b673135bab59130909f3a54672e9fa888ee517aa81641d1f60b2446407b0e24d4c075

  • SSDEEP

    12288:29X6FafsJfzi+BEoNGwCAS8+pG6ax9wGbg7:29safs9iME6Gwcvax9lbg7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\862fd2d95e0953037fa01b828db52c2f9aead801236a4c566a735de05119a21c.exe
    "C:\Users\Admin\AppData\Local\Temp\862fd2d95e0953037fa01b828db52c2f9aead801236a4c566a735de05119a21c.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.110ak.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1428
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:4207620 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1708

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b8c6f0de3a692522d470b985172ac677

          SHA1

          ae49ed3ff4e1a1a8ffdbdf8faf3d620ffae087a2

          SHA256

          112dc8ee29f6fb90df64b35e9e02901ed928180562b43c3ac7b233471d0fecd1

          SHA512

          4f34ce64d5e1d718d8898f28a6f7c2b7c4f82904bba5fc472472df041af55fb669f9d7c227d94e995b2a719060bd7b964da8a7b005b4396b518151b6ba6931bb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\92ZRU9WJ.txt

          Filesize

          601B

          MD5

          3a3e50c6c9b704011dd64dd33861a3e6

          SHA1

          589d357ccc9158e32d19b020365417d24fa44f18

          SHA256

          bb1cfee3c9e27cedce9b50d205425ff29105e2e6b41282f020745a259bafac45

          SHA512

          f42d73a895ad2f27784386878e6cf9ba12026a624a6736383174848d68286f93e044539cde42d0a89c14cd74eb510c9dcb180ee2fd2f4b661706da84754632ca

        • memory/1760-54-0x0000000075F31000-0x0000000075F33000-memory.dmp

          Filesize

          8KB