Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 04:02

General

  • Target

    877fb0be15d75b97a1f282b23604b8cf86cadedb2c1104b1942c27bb57702290.exe

  • Size

    6.2MB

  • MD5

    7adbcdcf1d32019e9d9731bb4ad0f362

  • SHA1

    9f59403b402956d31761478ec6617788f4f8465c

  • SHA256

    877fb0be15d75b97a1f282b23604b8cf86cadedb2c1104b1942c27bb57702290

  • SHA512

    0d60401b5edf48d0e97e667fdd6b2e3e24324acb5f1a7e3f9f645883e1dc115319d29b487f7b84aae57046feaf63554a604ca6ae834cbbe7d8d900a604393ada

  • SSDEEP

    98304:/lmlW8op9D0friHOdVOF24rIVKEHnWIitUJSD03idGHbjzeUPQWYM0LAduxcV:/kForweufOFBIRnOtUuTdGHzQPAduxcV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\877fb0be15d75b97a1f282b23604b8cf86cadedb2c1104b1942c27bb57702290.exe
    "C:\Users\Admin\AppData\Local\Temp\877fb0be15d75b97a1f282b23604b8cf86cadedb2c1104b1942c27bb57702290.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pcpc.me/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0fc011cb196449947b71e38d2345b2b5

    SHA1

    4a5b8087c2abdffea0b63d95f4bd7b6ca5ab352e

    SHA256

    4c0f3f7db6617759c81e151d89302d69889e059ad9464fb912f1ec4161de1ba2

    SHA512

    68d5c85df24e054010f60b14b00c54554981720158bddd57e2e890f3168ea8f0e61ea529dc517cf491ab8bf7dd136294ad9f9420be3a9eaf492319304af26d78

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    20KB

    MD5

    41905d8ba18ccb981ada3af7555de2f3

    SHA1

    08767d1945850458b750b6d1f50bab432546109a

    SHA256

    a40718ed60098cea2204f3e96971a047a6124327d84a1f67701429d7b870fb92

    SHA512

    b354495c9b6006dbdc7b9c09a2d3c8c5eca5a04fab87592592cdb569810f6e7930119a7272772c4ac4643eb78d15068d9493405f913aa8153e537ea6aa432996

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\COYL6AVI.txt

    Filesize

    603B

    MD5

    7bc865dbb127c5b43813ce78c8ad0d05

    SHA1

    191914b0f90bc175bacd138cfc143cc8e2d5f926

    SHA256

    ad83ac31a8286448a2253dcd7c57bf551cac910c0027d1bc323ff545d9e58831

    SHA512

    d06b716b877737456b5d15fd541085e893a2565259548af6dc8f955531d11560667e158b8c3991a2bea95627fe6baf727f7798c7615d2f7d906e0f9122f7ed52

  • \Users\Admin\AppData\Local\Temp\nsoEFDE.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsoEFDE.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • memory/800-54-0x0000000075521000-0x0000000075523000-memory.dmp

    Filesize

    8KB