Analysis

  • max time kernel
    233s
  • max time network
    343s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 08:05

General

  • Target

    d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe

  • Size

    309KB

  • MD5

    192b98651d71c5fb021ad218a4473571

  • SHA1

    4a8c0889f2f725b747db63583e65222c90b883d8

  • SHA256

    d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed

  • SHA512

    78a7194dd888780e9b72a404217e79b592f26163576bf560309479331d1460c0fbbaacc01cd3ef99859f9a3b7970debc620162724f8a3c129a5f954cef8e68cc

  • SSDEEP

    6144:da53G748znG0jAA2g2TW/OyqVY2RDg+HtOd0yE:053zALkAtqVdRE6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe
    "C:\Users\Admin\AppData\Local\Temp\d70553173679f78df378e38adcf50f318b83c1be40ecb39e23a33bcf08b0c9ed.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:360
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://best-hack.ru/load/warface_rossija/12
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1620

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a085e5f6f7a680b895f5df7dba421e6a

    SHA1

    b18aa9003a7992f9ebaeef645f7a29fcdeeeede0

    SHA256

    00b40f506db94fc27f938682e77086961a8c568d34e45f9566a97bdcc2c7eb62

    SHA512

    68e4798cc5d576f009ab95c53f3983b55c587bf68eb363102c22593e6a4558bcd944071156bb09c8c523202685e33b861a93f67b32e61a8f50c6eb8f5ee06d61

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FUJG1QZQ.txt
    Filesize

    601B

    MD5

    da9c106cd7a753473eaafadde19e493b

    SHA1

    1bef72e0b28a2e84a876162140371b1259f24c39

    SHA256

    aa116443506c5c65d4077e17c6dccdebbba5beb37f4c800061aad1b0c0f6ba6d

    SHA512

    1bf5116a6a06ffa51ec3e5aa92efe1a34fa88106f3a57a67d73a67ceaa5567c8b790d9c447a433ebfea1a6bfc36eff0318c1d84b2190e5fb3296a1daa772e4d8

  • memory/360-54-0x0000000000AC0000-0x0000000000B14000-memory.dmp
    Filesize

    336KB

  • memory/360-55-0x0000000075C11000-0x0000000075C13000-memory.dmp
    Filesize

    8KB

  • memory/360-56-0x00000000048B5000-0x00000000048C6000-memory.dmp
    Filesize

    68KB