Analysis

  • max time kernel
    165s
  • max time network
    209s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:00

General

  • Target

    1054394.exe

  • Size

    1.7MB

  • MD5

    373af03a25d66fecf5a303f45fce230b

  • SHA1

    2e0eaa1d2c284b5a956b3a8a844030d3b8f6ca53

  • SHA256

    90c723d8dd4d776a7c5d0f44233a23cafca10ba94c5a8db31daa71aaad0c652b

  • SHA512

    14a69f487596b3aa6131a9cc44c91c943e3091b2846d974ba4652970c8ba38964448a7ff0394f8918e507514a37c322ae5deedf5e145839c8ec5338b32d4411f

  • SSDEEP

    49152:QFzIUTG3vgMtytmkfhriQn5ImTiUt/Y5fbtSZ8:CzTCHt+hripqiUt/Ifb82

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1054394.exe
    "C:\Users\Admin\AppData\Local\Temp\1054394.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.51ztzj.com/win7/index.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1164 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2044

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    c0eff5ba2f1609c1164c9b25c764a386

    SHA1

    6a508cbc396ad8ecc5b3714d2510455e9a1af775

    SHA256

    e2776157fdbb2c5f1fd5dbad4d74504fc04c8ebf5bacd0dbb5ac931534b13187

    SHA512

    e7c74cbbe40392a09d669fc51bc5dc9cf5d68d7093442c0d2f07b02ee297b5ded05db00298ead90e549e95576263f6d88310917ee805e29227aa6c79ca53fc9c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    13KB

    MD5

    ee4c7863bab79b7676082c7aae604780

    SHA1

    a9b7be69dc2210e7ef45026006be325ad8ee4d5a

    SHA256

    dfc6ad6cce58c6e56779628f93e98f284dbcac856d79c3d508ade0676f0585a6

    SHA512

    1621a711cff932ab9bdd85234704a3e13f5078a7c0741308143ee3ddf960e985954a3ab93a52149556dedf0864d90b9ba024035b122a131386d137f1ec26aa76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DJKNDLIC.txt
    Filesize

    608B

    MD5

    26eb49bc0e6e97c992ce312059ecf002

    SHA1

    b462d6f617c1062d7e5c6928db4f6f36d42c2c51

    SHA256

    b61f4c1263b1e79e7f4fd6a7286c8755bd34d9a79fe5c2f3cb6f106db18b710c

    SHA512

    360e28ae8270d176ed0b6743eb1cc7eef6a52cd2e069b490777c7af67c9da1f70db5c2ef9d107b91ad07369a90620f4bb62e4f2ae416a3e2339f978972414033

  • \Users\Admin\AppData\Local\Temp\nseE005.tmp\Splash.dll
    Filesize

    4KB

    MD5

    ff8340b98dbd0c4f38d06627b97637a4

    SHA1

    aae736a26fbb1ed5e9fddd956115699a910b3435

    SHA256

    6dad450c8b77a4827899eb54347d6f0c3a225c56920b0565dbc6b63c33bc176f

    SHA512

    58eda9fdc3e69c651f96d2994c76afd9e09624de5622177996b3ca9cfb9fbadb4489996ac49d220de16963acc734853239b807c65c50f79d39f4b292925ec685

  • memory/996-54-0x0000000075E11000-0x0000000075E13000-memory.dmp
    Filesize

    8KB