Analysis

  • max time kernel
    127s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 11:04

General

  • Target

    f14b6c8707a9705a57d554847e414191738d67f53b572eb7cbd4bf45a0cf6676.exe

  • Size

    200KB

  • MD5

    ad2d269de4b6e20e3c5f05530abb8bd8

  • SHA1

    2fcfe67cd378160bb8ed4e3160ce80ccc08d6822

  • SHA256

    f14b6c8707a9705a57d554847e414191738d67f53b572eb7cbd4bf45a0cf6676

  • SHA512

    45d8ddfdea7adcb44377435d88bc0dd331798bb400f9e458bee58dbe3d7077430a2553e1f12ca102214527eded7c0516f024144414ec0c3abfde597a2503988a

  • SSDEEP

    6144:TlzJH5O7SWi9UpSGusPmwMa87XGS/EocnzvWBU:/s51HPzmXGmzEvW2

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f14b6c8707a9705a57d554847e414191738d67f53b572eb7cbd4bf45a0cf6676.exe
    "C:\Users\Admin\AppData\Local\Temp\f14b6c8707a9705a57d554847e414191738d67f53b572eb7cbd4bf45a0cf6676.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\ijqlpagmntplf.dll"
      2⤵
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:980
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:564

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N5230DNV.txt
    Filesize

    603B

    MD5

    a656e3a06e3965e5e3323441d631ab60

    SHA1

    a2b5ebbca6f9d5e92410aa4bddc436b0b2247033

    SHA256

    5bd59b7eb2d6001a8df49add46d980c56aa2f165ba359750f9092b2c0cf6d4c9

    SHA512

    97762fe97c04d5737a6143368a180737c9df26e57df42345b93986d9fb2df944c99122a755a8350091f8304906e750d931701112dd0a044e07bb6c74f97addd1

  • C:\Windows\SysWOW64\ijqlpagmntplf.dll
    Filesize

    381KB

    MD5

    572e7b84018c4384e6f44ee85a4b6921

    SHA1

    7874f698e0213610a2bb89c995274c5015bf23f5

    SHA256

    71d25c9e176b96387dd91a8ef801916e070cb6ee68be5714a7cb01085d0d8ea1

    SHA512

    e8d29b97e633478604b6b21eff299b56eeda319ee4db30c4e70ce33b1228eb9ea3e59ed7ef74bdfa0c3a1f49f29d5e77195e62340f32d0f68aaa0235d8d5753b

  • \Users\Admin\AppData\Local\Temp\ijqlpagmntplf.dll
    Filesize

    381KB

    MD5

    572e7b84018c4384e6f44ee85a4b6921

    SHA1

    7874f698e0213610a2bb89c995274c5015bf23f5

    SHA256

    71d25c9e176b96387dd91a8ef801916e070cb6ee68be5714a7cb01085d0d8ea1

    SHA512

    e8d29b97e633478604b6b21eff299b56eeda319ee4db30c4e70ce33b1228eb9ea3e59ed7ef74bdfa0c3a1f49f29d5e77195e62340f32d0f68aaa0235d8d5753b

  • \Users\Admin\AppData\Local\Temp\nsiF588.tmp\System.dll
    Filesize

    11KB

    MD5

    c6f5b9596db45ce43f14b64e0fbcf552

    SHA1

    665a2207a643726602dc3e845e39435868dddabc

    SHA256

    4b6da3f2bdb6c452fb493b98f6b7aa1171787dbd3fa2df2b3b22ccaeac88ffa0

    SHA512

    8faa0204f9ed2721acede285be843b5a2d7f9986841bcf3816ebc8900910afb590816c64aebd2dd845686daf825bbf9970cb4a08b20a785c7e54542eddc5b09a

  • memory/980-59-0x0000000000000000-mapping.dmp
  • memory/1976-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp
    Filesize

    8KB

  • memory/1976-57-0x0000000003800000-0x0000000003866000-memory.dmp
    Filesize

    408KB