Analysis

  • max time kernel
    151s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:00

General

  • Target

    1054255.exe

  • Size

    1.3MB

  • MD5

    574df1baeb8a3c0772c09ada7c0a72e9

  • SHA1

    081ffa1c06a5161e7613af8d304f5fb4f801bd6d

  • SHA256

    669176b3f6509dce172ed5cb1bc39e7460fe9e38bc3a715f10700139be5fee87

  • SHA512

    71494890b1b616f25c3f6809711b52f224fb1612c775a7e8d23250afacef54e77a2a808bbbc14998c08b9eded0d2743bc91d5fee5dd59c54e76815819161f584

  • SSDEEP

    24576:G5CF5e45qsC8kSxj4vR7I12obD+yaN1UYn29gFJTa4tui6vUrfb3dSNr7wQ:hFDtCUa1gGN1Un4TfbtSZ9

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1054255.exe
    "C:\Users\Admin\AppData\Local\Temp\1054255.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.51ztzj.com/win7/index.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1620

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    eb10fbe8819f7458690359f2417cf4ec

    SHA1

    ff65e2e1168f998c24878875b3c52e0988337b78

    SHA256

    a1e07bbb9ce5592b70fd8972df4f834a08ec9c8fcaecf04d216b0ea045d1b327

    SHA512

    d1a55b989ebcbf990e4e8bfb28e846c20ab187eb9fedb58c67a5e22a929dc4cdbfa6875f7f8883ba8c063f8ec52f016d6547407e23a8b04c4836a49eabfd04e2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat
    Filesize

    9KB

    MD5

    fc52ab82b03d9fd56b70369bb789a05f

    SHA1

    60cc02a9a2836614cd383062d5d715dcf9962a58

    SHA256

    7f0d386298efafd22d56f728f5c18db619e058e74635bd61f43ffe55ac757e63

    SHA512

    d5a36393bea4cbd53b94e01ce49203fac4ed062b853be017761a520d1bdc40a80b9d0762eaa48362977014962d0221c035295acfbc154779ad2f8db0a435ea77

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2ZCFEAQU.txt
    Filesize

    600B

    MD5

    352b5e838cfff2e5ce0f63edcdf7d578

    SHA1

    25c02159b57a5d6f80ad4d78e5550077e3d74184

    SHA256

    d1ac1050466be11810b5471a8e22c6ceb4a84e38683f24ea148bd63992f71664

    SHA512

    3190850bc64ea3ab93b7f8138930ab8f43c7b13a2852ceecf7afae60d20be5f740a1acf970ce829d813371fd43b05d17ad437a5f540da41b916f776c6bd07d51

  • \Users\Admin\AppData\Local\Temp\nso98A9.tmp\Splash.dll
    Filesize

    4KB

    MD5

    ff8340b98dbd0c4f38d06627b97637a4

    SHA1

    aae736a26fbb1ed5e9fddd956115699a910b3435

    SHA256

    6dad450c8b77a4827899eb54347d6f0c3a225c56920b0565dbc6b63c33bc176f

    SHA512

    58eda9fdc3e69c651f96d2994c76afd9e09624de5622177996b3ca9cfb9fbadb4489996ac49d220de16963acc734853239b807c65c50f79d39f4b292925ec685

  • memory/1416-54-0x0000000075F01000-0x0000000075F03000-memory.dmp
    Filesize

    8KB