Analysis

  • max time kernel
    119s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:57

General

  • Target

    da8109eb58a182a0491621e5bdd3aa5b6101e6bf1026c5aabb055b375acd7227.exe

  • Size

    439KB

  • MD5

    41059f0a4eb885f6c0a27734b3462fcf

  • SHA1

    e4c580beff560acb3e45220de2d9d1b2668f1ae4

  • SHA256

    da8109eb58a182a0491621e5bdd3aa5b6101e6bf1026c5aabb055b375acd7227

  • SHA512

    34b44fa1dd6612223463f591d4d42da4c7e9d279f4e49ef8b01e377a2ee319eaba80b9141f820c10e8ef3e78f2c3352db3d16fe4bbfb14511b67946d55913abc

  • SSDEEP

    6144:Dt+pZpwyFb9yxQCPl/cWxYvNZew7n2/vS8avVoRnXCcJHt17FRqDO4GZLAl:DApZvFb9ULVwK/aLVoRtn1zqy4ULm

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da8109eb58a182a0491621e5bdd3aa5b6101e6bf1026c5aabb055b375acd7227.exe
    "C:\Users\Admin\AppData\Local\Temp\da8109eb58a182a0491621e5bdd3aa5b6101e6bf1026c5aabb055b375acd7227.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://bd.svwpj.com/install.asp
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VH9WANY5.txt

    Filesize

    608B

    MD5

    26ce8be712f2c467ed7dae3bcc0fee93

    SHA1

    eedfa5b05cc5b2ba845ba2d664bf23bf58f245e4

    SHA256

    33b9c147b8aa7eda1b0c3d0377b4b4024d2fa2a42ac5f79e1f9277d19af81a81

    SHA512

    a4ae3ec8afaa27320f43e4314f7568f574c0ebc8c3249fc550b1c1725392fa31ded889e4cdd1363bb7a65bba65df16255691f2a95b6aaca3c63fea88c312f46a

  • memory/1232-54-0x0000000075C31000-0x0000000075C33000-memory.dmp

    Filesize

    8KB