Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 01:32

General

  • Target

    CFȶ͸V1.4Ѱ.exe

  • Size

    488KB

  • MD5

    24f126b61febea702f1841b03ec1fd3b

  • SHA1

    f3c83487e0c68827909cae2a088a505a1853f3dd

  • SHA256

    d522227503c0219be8abcaaf2b3856e200eed723d06044a3593329724d13bf38

  • SHA512

    e428c0ac6ed3768aa80488328726d960364dd484503587ef54c1642c098cee91e5dbb2ac58dff1454dbea896c39311fea36cf884028fc34e074d4cca6377115c

  • SSDEEP

    12288:jcXN6xZg9VuX6RhO/RQe6mRXcbaM/TcO2:jy6xOVuXshCfVtcbaM/Ta

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CFȶ͸V1.4Ѱ.exe
    "C:\Users\Admin\AppData\Local\Temp\CFȶ͸V1.4Ѱ.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.626wg.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1540

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          3dcf580a93972319e82cafbc047d34d5

          SHA1

          8528d2a1363e5de77dc3b1142850e51ead0f4b6b

          SHA256

          40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

          SHA512

          98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3eceb3033e8f79c54d1dbbbac05dd5ef

          SHA1

          1f4d3748b4bac9cb2a0a62c7e237453c769d21d4

          SHA256

          1863bfc713a3319e4b99ae7eedfaf8a77915c7c565c41729f049a3705a743aea

          SHA512

          65a65819debf2917e28a3ad0dc930dce552dc11f1ba066ed1f645611354f15d6c9e8e4116350323b2cfdcaf6557a305475636034df581803ccb15e6031f1289d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7ad24b18a9d89ea9410f7f46a89b926a

          SHA1

          72db8c42b3a13fd6470a06868b4fdf024728237f

          SHA256

          ec46af23dd9a6b07160a77a8110cddbac2b13612a05a8f5dc5af685065e37490

          SHA512

          f7c76c6680dcfd35c35ac600e52f80e629bb2088b57d6861e7fcc3e5a7ef6e2697afe47849424fe85404f2e3e5019adc3884ba91b6bcc5a96dd6ee9614efa6ad

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          4619aeff9ec08c0eb52a641f107cc502

          SHA1

          d5c2dfd36fc525e7cd73dd7137e960ef58172ed8

          SHA256

          38cd4715842f8e6394fe6a8f25d558894c087a5c7e1a9879ffe1f25bc63dac8f

          SHA512

          d20fe72604c77aeed35f37ba6cc1e1ca8e832b853c616140d4637414021b18b035bcd6c83effbbaea4f544d97c01db47abb829b1c5bfe7e0cbdb43fe4c5f969d

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          5KB

          MD5

          f020d0a5ab50e0af9c610f1601af59bc

          SHA1

          af2445f08c0db30d873cc7eac8c3004db8296dfb

          SHA256

          d5d7d4af5f6aba0faef6168a44247206663aa99971848adfdb503b7f8ab82043

          SHA512

          06aa259618cf01308d30f0c29fa9066c0ae73224233861ad147c67b460a451b904a0b89924660e7900ffcebae6468f58b8d97747678ea2f7717e7ae84d1f9abd

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\24TO8TOC.txt

          Filesize

          600B

          MD5

          276d2d36fa734ab495953f3453af1cbb

          SHA1

          5221d3f78b3e929d9b36ae0cc7d6b704bd4d6898

          SHA256

          8a18accf9433ef4218b12d9bab41f4ff78ecf45130b95340232e4fff6633d416

          SHA512

          5d92bf85685048540f6cfafcaa7ae3d57b8bb1d6a36e8e7a7cc3743dc6aa892e825003066792f5f13fc29f71743c27d5343673a1a0c0ebacb98e928316b8599d

        • memory/1168-54-0x00000000760E1000-0x00000000760E3000-memory.dmp

          Filesize

          8KB

        • memory/1168-55-0x0000000000400000-0x0000000000670000-memory.dmp

          Filesize

          2.4MB

        • memory/1168-57-0x0000000000400000-0x0000000000670000-memory.dmp

          Filesize

          2.4MB

        • memory/1168-58-0x0000000000400000-0x0000000000670000-memory.dmp

          Filesize

          2.4MB