Analysis

  • max time kernel
    159s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:03

General

  • Target

    e382e84e93e664ca59dff417783b4d6590d6e99c6dec501deccffbb1e71a1820.exe

  • Size

    15.6MB

  • MD5

    0cc7fce781f29893024c4ee445af66f8

  • SHA1

    ac1815eda9243e64495f08128608b6a4315f0ea1

  • SHA256

    e382e84e93e664ca59dff417783b4d6590d6e99c6dec501deccffbb1e71a1820

  • SHA512

    6e57a9261d2231a00400d4246fb49ee559b2151c4b730b85ef4758592f9a3d1f28367e6d6fea51ad3b271cf0b5747c4b4a8cf9885406d94c99597a79dd17c78a

  • SSDEEP

    393216:iFmqhSX06HF3RUI2eg+uLd2dW4yI/QpCUOX:WFME6HNKI2SuLIdW4yI/QUUOX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e382e84e93e664ca59dff417783b4d6590d6e99c6dec501deccffbb1e71a1820.exe
    "C:\Users\Admin\AppData\Local\Temp\e382e84e93e664ca59dff417783b4d6590d6e99c6dec501deccffbb1e71a1820.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Program Files (x86)\Common Files\FFF765507A88A.exe
      "C:\Program Files (x86)\Common Files\FFF765507A88A.exe" WfCSiyl7KCmSj3qDd3ySjx4eWi8qL5JifXkvgpKKe4Meknvp5uh75up75+l75OTqeS/r53p0dOrf5eXm6XjqeuTr59565Hvn53nkent5697fent5eXR0eHjfe+XfL9/m6N48eyZ7Tg==
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.longyingfz.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:572
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x490
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1624

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\FFF765507A88A.exe
    Filesize

    986KB

    MD5

    2dc7b890145800b3352e31ebaca97080

    SHA1

    519a8af15eb744a76602cb42b8f521ed898f508f

    SHA256

    be091533285a24e160ef6e1fc5439c8c9494968684fec50bb4dcacf2629c5a69

    SHA512

    a4876f3985710443ec18b17a4394c52e0132df0e6ec0016b4438ad1cbf680f9603378375763589c137e1f745f67355635651c46c29c7bc188297f6b3a5c371cd

  • C:\Program Files (x86)\Common Files\FFF765507A88A.exe
    Filesize

    986KB

    MD5

    2dc7b890145800b3352e31ebaca97080

    SHA1

    519a8af15eb744a76602cb42b8f521ed898f508f

    SHA256

    be091533285a24e160ef6e1fc5439c8c9494968684fec50bb4dcacf2629c5a69

    SHA512

    a4876f3985710443ec18b17a4394c52e0132df0e6ec0016b4438ad1cbf680f9603378375763589c137e1f745f67355635651c46c29c7bc188297f6b3a5c371cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    e5c04d14962260e4415fc084da63883b

    SHA1

    56469525b710b8fe5ae3ce1c7fbc375b6b57448d

    SHA256

    a9bcfacab5aae8ea1365ccdfb1138592a9cc07ce8fb301e83774a7a3c8541ad1

    SHA512

    82592e8d6ef318f18da4a52750608e711afc365e92329633f80b584ca1d27f2a596ad28745d6ae5f9ef4b4955b9a705e89775498a56ba657d5f242e4489cfd11

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1VP89ETT.txt
    Filesize

    601B

    MD5

    f4264b82a84e50e57e1665280b87b0db

    SHA1

    0c6ea6407c5c9bee108e74c61aa76159c9204f0a

    SHA256

    2d3665233cf6026cccee0e99e796c9e5830b84aa9b64efc9e55713889a5150ba

    SHA512

    f4faf0357f427f1075a8adfd8011ded99ca9aaa4c65aabe5cb191bc689124e955849167402a8d0b6711819325b16627cedf07957f609414c72495a413af68c61

  • \Program Files (x86)\Common Files\FFF765507A88A.exe
    Filesize

    986KB

    MD5

    2dc7b890145800b3352e31ebaca97080

    SHA1

    519a8af15eb744a76602cb42b8f521ed898f508f

    SHA256

    be091533285a24e160ef6e1fc5439c8c9494968684fec50bb4dcacf2629c5a69

    SHA512

    a4876f3985710443ec18b17a4394c52e0132df0e6ec0016b4438ad1cbf680f9603378375763589c137e1f745f67355635651c46c29c7bc188297f6b3a5c371cd

  • \Program Files (x86)\Common Files\FFF765507A88A.exe
    Filesize

    986KB

    MD5

    2dc7b890145800b3352e31ebaca97080

    SHA1

    519a8af15eb744a76602cb42b8f521ed898f508f

    SHA256

    be091533285a24e160ef6e1fc5439c8c9494968684fec50bb4dcacf2629c5a69

    SHA512

    a4876f3985710443ec18b17a4394c52e0132df0e6ec0016b4438ad1cbf680f9603378375763589c137e1f745f67355635651c46c29c7bc188297f6b3a5c371cd

  • \Program Files (x86)\Common Files\FFF765507A88A.exe
    Filesize

    986KB

    MD5

    2dc7b890145800b3352e31ebaca97080

    SHA1

    519a8af15eb744a76602cb42b8f521ed898f508f

    SHA256

    be091533285a24e160ef6e1fc5439c8c9494968684fec50bb4dcacf2629c5a69

    SHA512

    a4876f3985710443ec18b17a4394c52e0132df0e6ec0016b4438ad1cbf680f9603378375763589c137e1f745f67355635651c46c29c7bc188297f6b3a5c371cd

  • \Users\Admin\AppData\Local\Temp\H7F363\DBEDC536FCA\G8F6C56\CAE2gszFJ.dll
    Filesize

    985KB

    MD5

    392ee99c148b36ef56962263bfd17f16

    SHA1

    ddbbc756730006395535391b18b363a69c1f6d6f

    SHA256

    9a3858679f0913ae289f3bbfa989bfc50069346321a06f568e0184fb04aa5930

    SHA512

    a72a41a0dd813e63eaf0ae131b9af57c065fee2555aa584047373c6188a3fbb1299bf8faa6f49139bdcb9d58e325fd68e16d924ef562a804d4016a87092471e0

  • memory/1536-61-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-60-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-67-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-68-0x00000000012D5726-mapping.dmp
  • memory/1536-85-0x00000000710A0000-0x00000000712A9000-memory.dmp
    Filesize

    2.0MB

  • memory/1536-83-0x00000000710A0000-0x00000000712A9000-memory.dmp
    Filesize

    2.0MB

  • memory/1536-72-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-74-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-75-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-63-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-78-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-79-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1536-82-0x00000000710A0000-0x00000000712A9000-memory.dmp
    Filesize

    2.0MB

  • memory/1536-64-0x0000000000400000-0x000000000220C000-memory.dmp
    Filesize

    30.0MB

  • memory/1808-54-0x0000000075211000-0x0000000075213000-memory.dmp
    Filesize

    8KB

  • memory/1808-73-0x00000000008A0000-0x00000000026AC000-memory.dmp
    Filesize

    30.0MB

  • memory/1808-65-0x0000000000370000-0x0000000000380000-memory.dmp
    Filesize

    64KB

  • memory/1808-57-0x00000000008A0000-0x00000000026AC000-memory.dmp
    Filesize

    30.0MB

  • memory/1808-55-0x00000000008A0000-0x00000000026AC000-memory.dmp
    Filesize

    30.0MB