Analysis

  • max time kernel
    386s
  • max time network
    530s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 21:22

General

  • Target

    傳奇守護者免费版1.8.9/傳奇守護者免费版1.8.9.exe

  • Size

    6.7MB

  • MD5

    0d073c6b672cf3766da08c87393cacfd

  • SHA1

    749c4680d1312f3961e732774a8117f539b6ffb1

  • SHA256

    60873b32e91f5934705d3b514ca94a781906f82f460fb3e57db669fe1b1be8b5

  • SHA512

    f06d16c0b377a64544dd6c8e32c8330174a3b2aba15736884998e123a2c9086ca3dd4ca22b29bc5e072ffbbcaccf06b81b44d7c38b2db4e87a5c5aa625ab94b7

  • SSDEEP

    98304:cqZS0XIHS1YvYSu88ZHACE63R8TORhSr/llZBu44BYNkNHBI94HvXaEay9cAGrE:we95Su8846aIylAxYNH94HvTay9

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\傳奇守護者免费版1.8.9\傳奇守護者免费版1.8.9.exe
    "C:\Users\Admin\AppData\Local\Temp\傳奇守護者免费版1.8.9\傳奇守護者免费版1.8.9.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.184pk.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/584-54-0x0000000076201000-0x0000000076203000-memory.dmp
    Filesize

    8KB

  • memory/584-55-0x0000000000070000-0x0000000000DF4000-memory.dmp
    Filesize

    13.5MB

  • memory/584-57-0x0000000000070000-0x0000000000DF4000-memory.dmp
    Filesize

    13.5MB

  • memory/584-58-0x0000000000070000-0x0000000000DF4000-memory.dmp
    Filesize

    13.5MB

  • memory/584-59-0x0000000002C50000-0x0000000002C60000-memory.dmp
    Filesize

    64KB