Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 21:30

General

  • Target

    NFE.exe

  • Size

    637KB

  • MD5

    54ba1cac87156385cd0cbb839e0a48e9

  • SHA1

    4714d04bc414ec19c6665fe515e75711e321351f

  • SHA256

    47dbac990cde51764d34a03e522c3d2229ebbcede00a18162e5ee85320ac78f6

  • SHA512

    0fd8965d22ab10f6e2c12529dc76cbd041a822e4dd8a6c7b7b2f60a2efe35c4230e1e7eada92383b81f03be0ed9f86ee5177706514437dc91a1b162b897e2c79

  • SSDEEP

    12288:8fnJRcUfX3hhB2hJcusYSFjFdXOfYZdBXNEPYwjQ46ylGK:8BbfvBWWxjFdewFOQG

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NFE.exe
    "C:\Users\Admin\AppData\Local\Temp\NFE.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.google.com.br/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:512

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          da0f6c08baa5fda1e04c1007c446b94f

          SHA1

          3da41ea55a83f30a259801c2fcd9d5199f461be2

          SHA256

          72d41ca774f5a6b36f335c992217a6f21056ed1143017f152b07a9e3ff4e6591

          SHA512

          ffa61f9f5d3e0f506e77110c482c03246b63504eca47709417d4772ddf6e19c2460cc38314b8576cc58dd7ce81e60ee521ccd99f9b76f6918faf092d84c08de8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ebbad9a1905611d78899e3ed77704019

          SHA1

          2d15f3f6b387f8f6f3db37f97b52630e18870b7f

          SHA256

          673190947c42ac43d523d769a57fd88d07ab8d969ae4e7cb6241b935e2cee6b1

          SHA512

          833013dd91d9afbecec4e1762b90ed39f713d93814b056bba1fb26d4e9df4c83057fee0c8a3c7f7b8ffbbf2ad664b5e5be6e54c1883d5f33659bfa4c2ebd43e4

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LXC0WAIT.txt

          Filesize

          601B

          MD5

          591c157be83a15da847a68cb2d7ea2bc

          SHA1

          da94d341694bfe34a071f91d4f5b6037d08fdde3

          SHA256

          7e179bdd09ee7b0e570b77a311e2d21a39cd6555adb48c9584e0dd714b6bd47f

          SHA512

          e288aa26b11f51d1502cdf44e766c3931f8de3443a86a21f556c4f6ff7742a2e307da877e470cc23e311ae5a64e266166e4eb002a16fa4ce9bf6e2ab4b9c0c7b

        • memory/1376-54-0x0000000075B61000-0x0000000075B63000-memory.dmp

          Filesize

          8KB

        • memory/1376-55-0x00000000743A1000-0x00000000743A3000-memory.dmp

          Filesize

          8KB