Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 10:47

General

  • Target

    cab99e0dd8cb9752b50f6af5c0aa0eade53123a4911a429448a2c015c10090af.exe

  • Size

    188KB

  • MD5

    b6bb775b5aa960c8ed84b1f748b96370

  • SHA1

    48f25b01dfb4b71ac139f4dff9f146f9dd2fb3bb

  • SHA256

    cab99e0dd8cb9752b50f6af5c0aa0eade53123a4911a429448a2c015c10090af

  • SHA512

    d2ee3b10ccbf620d20b637350e826b0fec1fee5d09962887ffdcd99f2cb8b2cfd8544cdeeff603ce6201adcb749b38b74c894133899a5d6e8bccf10cc71a0df6

  • SSDEEP

    3072:VHOEInXTLkYyxglKWN5VcNSfFKAvbTewL7KFL2XC6T:VHSLkFgfNU1Avb9L7Kd2XC6

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cab99e0dd8cb9752b50f6af5c0aa0eade53123a4911a429448a2c015c10090af.exe
    "C:\Users\Admin\AppData\Local\Temp\cab99e0dd8cb9752b50f6af5c0aa0eade53123a4911a429448a2c015c10090af.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Installs/modifies Browser Helper Object
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:108
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\SysWOW64\regsvr32.exe /s c:\Users\Admin\qdnjiflj\qdnjiflj.dll
      2⤵
        PID:1684
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /s c:\Users\Admin\qdnjiflj\qdnjiflj.dll
        2⤵
          PID:1164
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:2
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1680

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AMARXRMX.txt
        Filesize

        608B

        MD5

        a3d420b3e0c31be39b4da5ec0ed4edcc

        SHA1

        3a7968e00a5de21c3dd49c2cf786d526edd6a2bc

        SHA256

        5fdd90adfc422ba0fb8205fb5ff7433a0166658e17b45072dee8265fb4cea73c

        SHA512

        8e838fa514bbffa558b8aa3cfec2e571e2bb73f8369e7f311f95cc6e185584695b9d04e409c1da1f98008f10de34e6a68a8de36b684a0749fbf442f310d02ba7

      • memory/108-56-0x0000000075B41000-0x0000000075B43000-memory.dmp
        Filesize

        8KB

      • memory/1164-60-0x0000000000000000-mapping.dmp
      • memory/1684-58-0x0000000000000000-mapping.dmp