Analysis

  • max time kernel
    110s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:37

General

  • Target

    Invoice_N78JHF236B4L5M77M_AX800 Series 4K Ultra HD TV - 65 Class (64.5 Diag.) TC-65AX800U_Panasonic.exe

  • Size

    537KB

  • MD5

    f14f7fde28054629de9143579ef3ea55

  • SHA1

    a119a23f1835765e02386db4e4d76e2ff492f82a

  • SHA256

    ef4184e1c5b1a5bff270c0c1528a58a97fd252fa0a0721f34bef2b95dd60a637

  • SHA512

    dc4f9a81ce816f627ed49f258aa943ae17ba650a0e0d325247e0193e2e501f2441a454188f6a7357cbb33f575e2af92151038fd007b1e4e3bf20b63c2c99ea52

  • SSDEEP

    12288:2RWNcr8oxnXP7r9r/+ppppppppppppppppppppppppppppp0Gu/8IaEaKbdI:NNBIX1qu/8IjbS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice_N78JHF236B4L5M77M_AX800 Series 4K Ultra HD TV - 65 Class (64.5 Diag.) TC-65AX800U_Panasonic.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice_N78JHF236B4L5M77M_AX800 Series 4K Ultra HD TV - 65 Class (64.5 Diag.) TC-65AX800U_Panasonic.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RarSFX0\invoice_Panasonic_ZE3J5S4D.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1756

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\invoice_Panasonic_ZE3J5S4D.html
    Filesize

    10KB

    MD5

    0a1f920ccf2d4c113d800159267da2ed

    SHA1

    50a927f074613bf52edceebbf7d8717818a78d20

    SHA256

    94252cf5c90b4bc5a3815092dd31376c4ceb10d49ed3bc2a4e4d2e44597c9447

    SHA512

    282ef229a9d71e88e46b4ada88b2a30dc3a3984931e6460b34a270b69836383b59e53afb2df50fad697c1b195a95f54525c9a76bf5867bf9df0850887ce4d905

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5DH9DYSV.txt
    Filesize

    604B

    MD5

    c7d94312962bc2e1d9b4974002ebe9c1

    SHA1

    03b064cb8855f1df13736135fbb28216f9b7b74b

    SHA256

    b1c421db05d437ff2811c232c8cc5ca5ce87d1570fe1787f34420d5bc5372f4f

    SHA512

    22e356f8f4559d5bb5ef56ba662a9dad380ee6e53967727203ab109c91dcdfbe5f1a07ae86679aed48294a0eeecbaeb4bfc2aa065a2cc9a5f66ce5ed15af3c9c

  • memory/2036-54-0x0000000075501000-0x0000000075503000-memory.dmp
    Filesize

    8KB