Analysis

  • max time kernel
    123s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 03:53

General

  • Target

    685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe

  • Size

    143KB

  • MD5

    cdc61cfc43b07bd213437e40f6732266

  • SHA1

    da8b89159ee60cfaac9795f374effb3b9c1bb986

  • SHA256

    685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e

  • SHA512

    f251325188b38cdbbc1477504885f58f8b147577c72ddf51ed4807e18ab745904c6f84f449d057d3b2694b9c55b8e534fc638f225d4a5047e39a43513e0b06b4

  • SSDEEP

    3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DU:pe9IB83ID5w

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe
    "C:\Users\Admin\AppData\Local\Temp\685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=4300109^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt36^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=4300109&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt36|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p1
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    c31cf67132f37319f01b4f51e3fb8ab5

    SHA1

    87ad2e2f8e0be01c7b547187dc997dd63a5b1676

    SHA256

    3e97acef8d4df4d98269bd171b614b08043e2d0ed6dad85c9adc6dce0e1ffce0

    SHA512

    6b527175b8effbc6f35c0e453f8c3b7ffdfb97d3464dd23229d26f165636f73865e51aa1edf7d1c5cebab8e69f8b1a45d56741096428816294ccb45eea70a415

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CDTIKTIK.txt

    Filesize

    597B

    MD5

    ba39545495002fdb6210da7f2dd08041

    SHA1

    160b20a705fcc35d88823b4689e9f2af4a601010

    SHA256

    a558b85705778a8ba24a467133231ba38888fb69b50268b416f08d94390525ef

    SHA512

    6a928066e7a654257001f010c652b67a8ebc139529f7f234a273476db8f047e2406e226d3d56ddfea172f27c71d00ae10af5e95c6adf64ec1a37c8295aecddd9

  • memory/2016-54-0x00000000761F1000-0x00000000761F3000-memory.dmp

    Filesize

    8KB