Analysis

  • max time kernel
    109s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:23

General

  • Target

    4360631cf8d0996c61c982b05dd2278147df2843109c6358428c2c129c58e7d9.exe

  • Size

    539KB

  • MD5

    07cf7e720a27b4409f6d2f61665ecc36

  • SHA1

    23131fb6c835f8dfe4bc77dfeee42045db025bcb

  • SHA256

    4360631cf8d0996c61c982b05dd2278147df2843109c6358428c2c129c58e7d9

  • SHA512

    040775fd8e2ba0adf0efb1a18ce114632bc1629f2fb03521778352ba9676ef630a7dcd2e46281b8e0249fd41898cb1f12342fe23b68ce46b8281547c0e6738f1

  • SSDEEP

    768:5tdZ4Po3qT//owQmaHA/cvcPqtZcvqt0QWqA:5OPo3qT//oYn1q

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4360631cf8d0996c61c982b05dd2278147df2843109c6358428c2c129c58e7d9.exe
    "C:\Users\Admin\AppData\Local\Temp\4360631cf8d0996c61c982b05dd2278147df2843109c6358428c2c129c58e7d9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://goo.gl/EEnmQf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    55f7d6b1a667a564490ed376cc078cd8

    SHA1

    145e5b699fc295e13f03dc04c7b730b66c1a096d

    SHA256

    fa321a35b71a93a93e88c8c0d277ec252b867f65a83f0a4967e7ce75744b5eab

    SHA512

    29ff14e277ae970b060cb5108f1463431791177ed4123d81b2a339a79f3c98d23a9722d9344b5a22b7d0508eb16247eff30eecfd1411af65277ae7f20a92b066

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OZ5QYDXN.txt

    Filesize

    603B

    MD5

    72b80d4449bca924cbaa2ea8b8eaa28b

    SHA1

    b3c265fdf5ae388ec28db2dc00d8b9dd260e46f0

    SHA256

    80ff812ee1546045880be9f5a8ecb4864b9aaac0742922f239a6f1589b55f70d

    SHA512

    25c0fcac9d84c07cf69b489267a8c1efbe08b2c6cd99fb3a211671a9bc6952fa71f7f5a5a3d87d9c2c82b71320191ab19dc86665f6899111b9197735344335fb

  • memory/1752-54-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB

  • memory/1752-55-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1752-56-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1752-57-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB