Analysis

  • max time kernel
    125s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:29

General

  • Target

    e2a64c5465504a27ed3e46c05f872b6b02dfb1f8301a435d8b678fd0e7cbaee4.exe

  • Size

    524KB

  • MD5

    4f898a6a4524b4998b8a14750dc2fcf2

  • SHA1

    bebc486d5508695b4735c8840592f847ded6e2d3

  • SHA256

    e2a64c5465504a27ed3e46c05f872b6b02dfb1f8301a435d8b678fd0e7cbaee4

  • SHA512

    b073ea0b8ff0861f5f29c62e31abfb24815f8f015a6b2ac56a19b90f1fafe791e78dc8938d85dcdcb36e83d3a5d37501e9548c33abf5450ed297522414d3be44

  • SSDEEP

    6144:lfxWd/K1JxNgczX8B83h0fIWC9kR6B0du0TV4as5LWaz53/UX:3U/Vat

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2a64c5465504a27ed3e46c05f872b6b02dfb1f8301a435d8b678fd0e7cbaee4.exe
    "C:\Users\Admin\AppData\Local\Temp\e2a64c5465504a27ed3e46c05f872b6b02dfb1f8301a435d8b678fd0e7cbaee4.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=gOO_UqzEc5Y
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ab076757187a302efdbc8e64f2760f9

    SHA1

    f70a74db2cae5253e8323b666a7fbb871060624a

    SHA256

    26105aacf3e367b023f9c38dda076722b0407ff64e0b975a9b73eda05df6690b

    SHA512

    a679500bfb1dfb823533894df56a14f498a1691106fff0e85c30ab5615724b0d73c88ba6f4b74a40038958fabc7206b09803ad7cd1c1dbd6d69ec4651e7c8847

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    e70ca5b656a72f9d14677dfe4c22f0d5

    SHA1

    44c65f44b8e366e2457d40e644242aaa05ae077d

    SHA256

    920681bfe2c138c903ccd26fcfd6a4f5ffb91f28ee7654189e157f33b271f0d4

    SHA512

    83431fcd384663372a55fdb31e7d91075ec5b3fa26be81c220c2a3104530de5c26f17801cf239153f7de2be5a46a81f1997f9e08026fc8373ce6230611ea196d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B07C01JH.txt

    Filesize

    603B

    MD5

    0c95c22b17cab0bb0e57ecffcfd51d0a

    SHA1

    ecaf48f4192e1c2b8b5915a1a99c1b62c0a620fb

    SHA256

    a9f6fd12c3bc100d19e133b4f6162da58c8e21f7ec9ebaa443e0230df5d539bb

    SHA512

    75204cb1ef398cf67d6c2f56739edf3cb1991e46e468821122fc3f0073a0531d90d221d5d2e24ae4e45832fe176146b9bca6f34ab2186d8490f9faa34588a87e

  • memory/1752-56-0x0000000075111000-0x0000000075113000-memory.dmp

    Filesize

    8KB

  • memory/1752-57-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1752-59-0x00000000030A0000-0x0000000003B5A000-memory.dmp

    Filesize

    10.7MB

  • memory/1752-60-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB