Analysis

  • max time kernel
    221s
  • max time network
    298s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 20:16

General

  • Target

    9867c8d176e724a2ab10098ff19beccb5e006103a2a77e9a6a74c38422960b24.exe

  • Size

    2.2MB

  • MD5

    1be1092a4fa89860e7328d16dfdd3512

  • SHA1

    29885cd68b6b8acde1584bb4265ad85c2b2d4526

  • SHA256

    9867c8d176e724a2ab10098ff19beccb5e006103a2a77e9a6a74c38422960b24

  • SHA512

    87ea2ee4abbba1e41eebd4ec63afc639dfe81faeab2c246d1a911fa7cfa68b79fd70c7c7aedd2767db8d8e62345f51015cb6eb111ccea2d64ac24bca7fcfd616

  • SSDEEP

    49152:2leBez5K/OO0i+Mg4Om3RcOYPhKYuJAJFtgCCw5H:JUK/wgR+KAFtCAH

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9867c8d176e724a2ab10098ff19beccb5e006103a2a77e9a6a74c38422960b24.exe
    "C:\Users\Admin\AppData\Local\Temp\9867c8d176e724a2ab10098ff19beccb5e006103a2a77e9a6a74c38422960b24.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pan.baidu.com/share/home?uk=406623129
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1612

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    687dfa0ef02c5e7b9b70b73949b24ed6

    SHA1

    61561243326fd57e91a40d6623f6f2321552bd9b

    SHA256

    a22860aa83f4aadedc81abf49bc520610f3c1ccb91df3302a50afe335bf05117

    SHA512

    5cb95b0ace700cc49349ff51bbcc9f60891f34533cb7fb9889b194465eb4ed752b28d628e837ad7604927a63469e9b8a37a7f3cb2cd8b0032fca71be4c62b4b1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat
    Filesize

    4KB

    MD5

    b22d21c7a91eace85bdb4d191009b959

    SHA1

    af434ca58605347851804bc5dd0017e342dbee04

    SHA256

    1bc6ce45878698ebe78c409601d354dc71c0161ae0a5289795cf5acda21e97bd

    SHA512

    81aa1de7111f159583b9d7100590ef730d2e3a81a527c76c985d25393240fc05908ea152feb5390be822782368c3ba4b4313457725e6ed2f354559a9ec9bafee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VA2LKRI8.txt
    Filesize

    596B

    MD5

    428463ff49a1fa83c1e1e607cee512bc

    SHA1

    9c8fb9264df7351812b1dc0e2776c9ca853ab65a

    SHA256

    e3d06ea75ad02e54b84c5e9d822953e2e2f1a7bd2345c3c9e4536b2297cac7bc

    SHA512

    0cb163eac82fd3a26dba1a07f8182f62d3ad9bef7c33521f4ff118685ddf4fda3009a3d903f4ebccf1e6de38cf862cf8afdfcb932c260c09fd16d5978b05f4bd

  • memory/584-54-0x0000000000400000-0x0000000000965000-memory.dmp
    Filesize

    5.4MB

  • memory/584-55-0x0000000076D71000-0x0000000076D73000-memory.dmp
    Filesize

    8KB

  • memory/584-56-0x0000000000400000-0x0000000000965000-memory.dmp
    Filesize

    5.4MB

  • memory/584-58-0x0000000000400000-0x0000000000965000-memory.dmp
    Filesize

    5.4MB

  • memory/584-59-0x0000000000400000-0x0000000000965000-memory.dmp
    Filesize

    5.4MB

  • memory/584-61-0x0000000000400000-0x0000000000965000-memory.dmp
    Filesize

    5.4MB