Analysis

  • max time kernel
    151s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 01:31

General

  • Target

    CF三金稳定方框透视V1.5免费版.exe

  • Size

    490KB

  • MD5

    a08eaff62803009f8f548bd783a593f1

  • SHA1

    7cd6ab27ecfcf9f7704fff82208e36762f255771

  • SHA256

    4c9f7bd7da4605789b50334310a2c6cd212b7b147f43e869c1c189cdac59d7a9

  • SHA512

    ed9a95638d05ee3355448193a3e0d49c33830b09b5701cee198a792ee8d92521e575a77440a6652d24e44b6a646bbd7866967cf350787e62fc26fd619c028eb5

  • SSDEEP

    12288:UcXN6xZCI23kq65ufcRT5Wn2mmYjCinrbFgq9krZpp/cR40J:Uy6xM/MTiz7CinrbF/krZj/S

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CF三金稳定方框透视V1.5免费版.exe
    "C:\Users\Admin\AppData\Local\Temp\CF三金稳定方框透视V1.5免费版.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.626wg.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

          Filesize

          7KB

          MD5

          64bd9a644bd182581368e3ce024dad9a

          SHA1

          1520bd16d65200bfa86d889eb88f4f62a65dd007

          SHA256

          5814095df174f580f08019718d2f8d05177276906620e36564588ba4b19ddfdb

          SHA512

          af1ec9959334ae377a1b199a44ec31a3cadc1273512f8a2644eb8b3b21f24d4afe1c0515a3bb685bd35a0856c2d6383504ee7e72ae67f87f3bda0a8ff91ec5db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

          Filesize

          232B

          MD5

          ca34dd825e01a869d485569337a2b86a

          SHA1

          9328905937c532f088a8de6a401db3bf97cdeceb

          SHA256

          4ece8b83dfc1b999162ec30edcab7aed266c72687ef97d0fa0f8f1c66831c4d1

          SHA512

          5e5c0ad3e3df2dcd754782784adecc1aec8d9b21bdebe9f86537e3f38e62fb96a78593eb7ee48c2c49db332688f62962af1e9bb442b82715de50cc333200cd37

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2a246fcfbb1190ce1a1fa874c9fa9926

          SHA1

          36249037575ac2f604ac28196baa138e2460316e

          SHA256

          a1d6876e770b820298e5c45f9979eebdf78234f8b51e77c24d56e611f4ae541a

          SHA512

          fefd356e07e863b5316bd39f85957fe36da20f206a14b20a6073644f454ab5199ca052b9b7f6f6fc870074687f01b88eff78dbe6d071f8d05586796744e4a509

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

          Filesize

          1KB

          MD5

          492bb49dac9a883f27386071a1da9880

          SHA1

          d26857eaec3d36a01c4de9c898e102131c6acf28

          SHA256

          5b1acb10d0cc402f5e5589c15d343baab6c3253f3e03d6a33304a7a06fc65213

          SHA512

          59e0e0aa054fea31b21d65041ea851fd9e4a3949ecf96d731a92bd1976b50233b5c9259af4435879cc78508a5396924dd9fa55882a36379317342e9c79ac7286

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\85ALAQ7S.txt

          Filesize

          608B

          MD5

          c46a2893d346c7689abe44f6ca060fd4

          SHA1

          e17d3825d05e08f2fd2c92fd95ec7f0340c7a2fd

          SHA256

          d38121febd0945ae2596da95d168f7648f67a3770e8860766a4b5e8ad1d4ede6

          SHA512

          d98ecd1a3de8a2f2741a1ecbc605d5b384a821b85de253e7fd06820c95ec9fa9cdd8f73b56bacf17dbb3ae0d72426ccd0288aab4475504e04b4438427c0e7d8a

        • memory/1416-54-0x0000000075F01000-0x0000000075F03000-memory.dmp

          Filesize

          8KB

        • memory/1416-55-0x0000000000400000-0x0000000000674000-memory.dmp

          Filesize

          2.5MB

        • memory/1416-57-0x0000000000400000-0x0000000000674000-memory.dmp

          Filesize

          2.5MB

        • memory/1416-58-0x0000000000400000-0x0000000000674000-memory.dmp

          Filesize

          2.5MB