Analysis

  • max time kernel
    123s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:38

General

  • Target

    0bb6278acde0b7e0bcf7088b12447db6c9493c3827c2a38667847139bb0824e9.exe

  • Size

    504KB

  • MD5

    2b0339907662d614899bcbd97816a9e5

  • SHA1

    608200c4a096fd02ce6e31aae3ee126a9caad193

  • SHA256

    0bb6278acde0b7e0bcf7088b12447db6c9493c3827c2a38667847139bb0824e9

  • SHA512

    e720065b6367aaeba78bb937b22199fbbd52aa81c999a4baf94df5ac6ce6e0824928d227473c4222ec4552f9932d12b75ed80c8f2a41552226564508ac1dcb7b

  • SSDEEP

    6144:L0OR4Vji+xwxxhRldcYQU2dWWA1S0RxRz4IoNu232sX:L/KQrIP3

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bb6278acde0b7e0bcf7088b12447db6c9493c3827c2a38667847139bb0824e9.exe
    "C:\Users\Admin\AppData\Local\Temp\0bb6278acde0b7e0bcf7088b12447db6c9493c3827c2a38667847139bb0824e9.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=gOO_UqzEc5Y
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:952 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    6d1608ab69093cd7b739c64568e465ae

    SHA1

    09a521f86ac2610ff868c2e6a2cbe61d42ecda72

    SHA256

    505ad9479c62cd9391f0ec4e98674bf7a94e1f6bc3781fc9ed4c5a902a5d2ee4

    SHA512

    aca01820af285cd86821da68796c7c8c6390224bafa07ae6ef6c1a91b763112519176bfa74abc232a567faccbba2c6303acbb1931965eef461d9f65bc20b7703

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    5fa738ca49e215ea9c98fdfa26029cc6

    SHA1

    e061503189cd449692186f0e6179faa7729ca2aa

    SHA256

    814cdd0211044d769d020b4e62f78b4378c9a10d78f9d211c7bc0260dd0f52f9

    SHA512

    d8bc4a70dfc6708fd7be351a02a4f6c496726fc80db74b5c77050a89ee41e3f3530373fe0a0a0f105042ffd9094ff67151265a8c13ba6c4228819d53addce919

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CLKO34I2.txt

    Filesize

    608B

    MD5

    afacee8c73f1c7fc2a6885726ca6d3e8

    SHA1

    67cff674ed5fd0f3b2ab73ea0a4c7906773b7820

    SHA256

    c84ec88bfeff0fa5a593d774744a0fd9746269b07d0e7cf55faba1122784cb72

    SHA512

    89a45beb9d597857d31147857bfeb218833e37063e6563f7bda6b0ab2fc3d263d462f36c3f9e3db22e1b517efe9718a5bc5bab7ea65a9f7710882f79e3dfd6e1

  • memory/800-56-0x0000000075521000-0x0000000075523000-memory.dmp

    Filesize

    8KB

  • memory/800-57-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/800-59-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB