Analysis

  • max time kernel
    117s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 20:36

General

  • Target

    ppaa1014sp1/跑跑艾艾1014sp1.exe

  • Size

    2.3MB

  • MD5

    c86e2b0ef9c20c71a0f6c9613398aca3

  • SHA1

    e3c3fdea0b66351c1cf15e38a518060cb27ed8e2

  • SHA256

    cbdd87aa4fcebe526e7596b43d263883549e505aa83f6955094963e34f0a3c38

  • SHA512

    5579b8a1439d0c619003bf495820d91215edcfe318ea7e453a930a2f95a5f43e810c15215336520fbd8f764136476fc951db4499c4102ab635dfee2711b55033

  • SSDEEP

    24576:MQs7/tU1/YbzG+ZakAAMVY6d83fElEjLzEeE9usDr+ClG82Zkw3BOTPx:MQsCVVQsl6YeauqlG6VTPx

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ppaa1014sp1\跑跑艾艾1014sp1.exe
    "C:\Users\Admin\AppData\Local\Temp\ppaa1014sp1\跑跑艾艾1014sp1.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\empty.exe
      C:\Windows\empty.exe 1048
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:808
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x56c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1752

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\empty.exe

          Filesize

          9KB

          MD5

          523d5c39f9d8d2375c3df68251fa2249

          SHA1

          d4ed365c44bec9246fc1a65a32a7791792647a10

          SHA256

          20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

          SHA512

          526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

        • memory/1048-54-0x0000000075A81000-0x0000000075A83000-memory.dmp

          Filesize

          8KB