Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:00

General

  • Target

    30204.exe

  • Size

    606KB

  • MD5

    7e2fa02367267aa674f7c8f236677234

  • SHA1

    0006bf31a13f95ab3a96de0afd1fdcf4a1f7dcbd

  • SHA256

    489b8cda1137f8c90c92c2f0f2f5cf678c823b3e75f02af1500974a671923670

  • SHA512

    84534cfb3aebf250b571304f4696adb51294a31f4099959051f3555dd5c33939e04f3973cc7b88b9792e2adcb082609a6d91dc70c0ec70f16285113c79ce8328

  • SSDEEP

    12288:GwgCF5I/sDFdLepa4tFt64boPnUq2fb34Cd1g366raOrNOvxCIr:GJCF5npdLyaE64bovUrfb3dSNr71w

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30204.exe
    "C:\Users\Admin\AppData\Local\Temp\30204.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.51ztzj.com/win7/index.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73e77667d8194e5d4a41a9851fa1b7e5

    SHA1

    d6ac9bd15bb940bdb885efde6b7ffa66df2f3a17

    SHA256

    a0d3dd8c077b8d756d5c99dc472cbe8fef70d63519de797dd03acb5d4f31eb73

    SHA512

    98ab0e14f3380af0d297a19f6f8730205af7dc47fc40af4d09c83438d4b5499c617cebc4ce2e8323fbfa99153a988309ddb2d3a417c8f2389f08e929baf57ccc

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1wzfztv\imagestore.dat

    Filesize

    9KB

    MD5

    9b344c6a4a81a6fef92fd4a72832c335

    SHA1

    68cec3c1eecf7102d732d68fa14cbd731cbc6dcd

    SHA256

    db41d1f1d836306de3bc64a985742f591eadc839472e546db3c42f8bfb6705f3

    SHA512

    208a7384f6533e0b8dfa0f8dfd6237a908d72bf52210bdc330f28d2fd01e1fd36cbfdd88bea6edc27ccfec4fcc473016cd0e52fd959e4a6577e139a206fc95cf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A53837BZ.txt

    Filesize

    602B

    MD5

    e7bb97c3b2481c73014eff8c7a0fe43e

    SHA1

    c6e434e3326daecc5cab08d6ee24f082bb285ce4

    SHA256

    0dbfe116144b677499c588f59c736e280027ec4bf643591e4fc79002c049b439

    SHA512

    c206e6a3b8263380a8081ec073308a32da3994a4dabf3d082b057e16bb5c855cf9e4709bd9f8c03dcb15c2cb8788a36add266d53525f403ba0a303eeb0313d15

  • \Users\Admin\AppData\Local\Temp\nst3094.tmp\Splash.dll

    Filesize

    4KB

    MD5

    ff8340b98dbd0c4f38d06627b97637a4

    SHA1

    aae736a26fbb1ed5e9fddd956115699a910b3435

    SHA256

    6dad450c8b77a4827899eb54347d6f0c3a225c56920b0565dbc6b63c33bc176f

    SHA512

    58eda9fdc3e69c651f96d2994c76afd9e09624de5622177996b3ca9cfb9fbadb4489996ac49d220de16963acc734853239b807c65c50f79d39f4b292925ec685

  • memory/1440-54-0x0000000076301000-0x0000000076303000-memory.dmp

    Filesize

    8KB