Analysis

  • max time kernel
    195s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 23:47

General

  • Target

    87789c597728e9738862ee3441c2f29a8c6f66e9da6bbb3c7eaab55071cff321.exe

  • Size

    877KB

  • MD5

    a81765d898e7332ba29150aa446c57a8

  • SHA1

    8bd50e9dd2b7c23b1f99bb862b0671110d46c4fc

  • SHA256

    87789c597728e9738862ee3441c2f29a8c6f66e9da6bbb3c7eaab55071cff321

  • SHA512

    1c3002051f1c5bb6a042ac0dc348db835670ce4b246036dd1f2c699ff68ed73413d9e4ec0f9cbe9c0977627972a0c946bcfc210f7f2b0a617ebe18c0d6234cb2

  • SSDEEP

    12288:7a9tGEY8ixdHexn1gBRch8yIzWT0i6J6AWpj9OC66WG2bYEo95BGnGi1zNEVPQS5:W9wKYexOPX60iaWpj9h6e2bYLGRxMuIP

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87789c597728e9738862ee3441c2f29a8c6f66e9da6bbb3c7eaab55071cff321.exe
    "C:\Users\Admin\AppData\Local\Temp\87789c597728e9738862ee3441c2f29a8c6f66e9da6bbb3c7eaab55071cff321.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\PRo\9.9.exe
      "C:\PRo\9.9.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3192
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:2512
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4500 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1928

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PRo\9.9.exe
      Filesize

      512KB

      MD5

      5ec231a168320624a9a447af0ffca09c

      SHA1

      2e6dc9d0326833dc8992e09917f9e19dcc28b4fa

      SHA256

      540b612713c0d209751b8c79276db6b6f6fdc60a3b2dcbb94cb51ad13927c508

      SHA512

      cf05628e335daeca9fc94e9f2713fda3dd84c8cb1fa2f5802711f4aabb4f01625f807046262f97dd39ce27afffe8b2aa1caccf539215fb1eb1b64316e5a9d373

    • C:\PRo\9.9.exe
      Filesize

      512KB

      MD5

      5ec231a168320624a9a447af0ffca09c

      SHA1

      2e6dc9d0326833dc8992e09917f9e19dcc28b4fa

      SHA256

      540b612713c0d209751b8c79276db6b6f6fdc60a3b2dcbb94cb51ad13927c508

      SHA512

      cf05628e335daeca9fc94e9f2713fda3dd84c8cb1fa2f5802711f4aabb4f01625f807046262f97dd39ce27afffe8b2aa1caccf539215fb1eb1b64316e5a9d373

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      84464274ad0baf0f6368c19d5377319b

      SHA1

      2ce075479a0877f76e75712a0f2c6292eafed5e0

      SHA256

      cfcf1e1f5ac6761b8228ccbaf14fa5695361c5ebef8c30cf54564a3fdf6a4347

      SHA512

      7257fcc3960dc148e3f4c0010985dd8ec597e5a59f325adaf83cdaa591778d130461181d032496e49d26d8cc7b325bc345832ca27754a602f75cbcabe86f21ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      471B

      MD5

      a42abb21be3940a88a73771b18ed0f35

      SHA1

      de12f2f619852ef135ee726614c43c2033ec5743

      SHA256

      edaf1fb1f6ca2a0caf5f4d85b3f13507bd5df4971fa9ea8a6e08c1227f1ec667

      SHA512

      c1f775deb2bcb2e0c48ed74dec1cd95f34690ca16d6465175d52d60ae45e746201cc608a58b6f8f080b7e6a7893993b61093c7d9ff63fa735ebaba61ddd0ebf7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
      Filesize

      724B

      MD5

      f569e1d183b84e8078dc456192127536

      SHA1

      30c537463eed902925300dd07a87d820a713753f

      SHA256

      287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

      SHA512

      49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      4f1210aff3d12253d1fccf83db52f0a7

      SHA1

      f781a0f54958b33721a279c5c5eaf73a97245f53

      SHA256

      a7afcabd247ac3da4ac24093df8f0981ad144a8c30e0cf922d0fded32817c6d5

      SHA512

      511caaedb8d785f001ba60660e07b19939d33c2ce34a74580c230aa7e4c9ebf6ec82fd2efa055ec20216872a0aa76107b7d01452dad9a2a8b38d2790328f892a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      404B

      MD5

      d122b1c4d35bed616f0e87d801a61f86

      SHA1

      9d337a39de44e5e141e011de3a4ba04282a9a331

      SHA256

      7277ca63fc3df577bede3a58221b093a7ff1d4519709f7fafb69a73a7751417c

      SHA512

      ff531400a038fb96cb0296cd7cc2ae8d5da8222456ef911bcdecc253d5b700e4e0d4edf12cf12cdb608306fd17a5ad3dbe65b231ff15ae0c8d2e294034b38a45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
      Filesize

      392B

      MD5

      09b50ac474b357fd3a6183aa7ff83d3c

      SHA1

      79bbf70340a390c7d2ec4049aa27fee4bc64cf9b

      SHA256

      5b0207a06a11485a47955827c0e0f662f55f13fb562afcd6ccfeb2f78148a7b1

      SHA512

      b57c290fffe436d014c78b822b527d42b571a626d4c06180a118c9cc04efe7e4b0415582f6643311517dcad0b4406f5e8d0042ca2772ac5ab71df80f321ccace

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat
      Filesize

      1KB

      MD5

      f8763995a9960be18b061e295003457c

      SHA1

      f30c1229cd252fc95beb6ada5810d5faed781a32

      SHA256

      8f077496cda966714d972419811d7e13fc3f2eb5c08d68095fdc4729c22d577e

      SHA512

      55535f489b14f8ac1441b024a29178f39ac4be08e8f08565d732ab4cc62a6976d99e51e6be1661844a8c17da3d3bd53ae718333f669c3fa70c375daaeef22c89

    • memory/3192-135-0x0000000000400000-0x000000000050B000-memory.dmp
      Filesize

      1.0MB

    • memory/3192-140-0x0000000000400000-0x000000000050B000-memory.dmp
      Filesize

      1.0MB

    • memory/3192-137-0x0000000000400000-0x000000000050B000-memory.dmp
      Filesize

      1.0MB

    • memory/3192-136-0x0000000000400000-0x000000000050B000-memory.dmp
      Filesize

      1.0MB

    • memory/3192-132-0x0000000000000000-mapping.dmp