Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 06:07

General

  • Target

    СĪռȺ.exe

  • Size

    984KB

  • MD5

    bdaa9886901b42e41f4f524dee3a3f84

  • SHA1

    bf29e4bfa980ac8d58e1d3ba90cf21317d78f11c

  • SHA256

    2aa7edb3dacc28465c94190f0f2e848a6ade8a68e252b429c30e085cbc4e0178

  • SHA512

    aa406bd61c6c1cd4afca9333b61ca1fca062cfd15013bd664b59ea79e69a007da9ab71efe2b0fd1d3b9ec098b7f7803f39ac19601ae7d0839c489b997ddd8079

  • SSDEEP

    12288:4aadGx15ff6aGqTWQj6v7QJJfP1kxmRqMwUvrURSdK6npmXuZRy4vBMu:gdYvffTTGcbWo0Uw87mXuZRZB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\СĪռȺ.exe
    "C:\Users\Admin\AppData\Local\Temp\СĪռȺ.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://user.qzone.qq.com/510448903
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1696
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.zuilezuile.com/iclk/?zoneid=108162&uid=50319
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c2ab94416b8ecd70cb1b5da50546689

    SHA1

    b01d09056bea82b4d167e68202fa005b6c5c03b8

    SHA256

    06cf7c1f53d6803de665850d5dfbf1dd91240680ec7aa0ac4d23dad871d34733

    SHA512

    8942746399526571fd14184f7d5b5a45aaa863eab4277320df3c929b71f1c9e4ec63a099e5ef875e1d86250fb514f49a19a1c546d9167626f80719509a5f63e5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3C5B7961-6EC2-11ED-9F1A-42A98B637845}.dat

    Filesize

    5KB

    MD5

    84eb4e0f033f1f7a7d65a4a13f7c3332

    SHA1

    0335929e4cbe3e0017837687e0baaa77f794bd1a

    SHA256

    e0cecb046dc8134697329a3d488c47c633db056917bd03acc593fda0139389be

    SHA512

    1af8e8c94e999e043e0b3839e49668f0c87ebb0ca41eae7ee9f110aefd7ad98cea720109aa175c69d38ede1df5d6e444192f77bf7bab6145b538a810aa1c94b8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3C5BA071-6EC2-11ED-9F1A-42A98B637845}.dat

    Filesize

    3KB

    MD5

    19e1c10d2b89c2def98ac4c9b253f27a

    SHA1

    1138561e79a7ae7a02016c4cf1507d91cb8448e9

    SHA256

    3270bbf7ea9fac7f0d5905488427d9e9edd4d106e31229127a43bac21c747a95

    SHA512

    2090fa97bb4e861a6f0e345cb848102c6c865566adaac20106850e8bf7d7e68e65c695d356830698f074fb7e54d8decbb4d8459a3398d8b9915a0c2dff3ea012

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    9KB

    MD5

    be5c6f7e4b8710a73aa0f1d35df37059

    SHA1

    b675b14f9d34cd082d6f8f87cff6231f1bf87094

    SHA256

    4b81bae690510f903b1dd41101f6102871d89b0a7965eb0cbfa34e5152c1c03b

    SHA512

    0ee2a54d62d8de11e9f7a7fc96dcaa205bca142b5203421fd3afa3fbb512124628423953f42eb33328280f7b9776e8fecceccdaf51c802dc04a1d04cea25fa5f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K2BOA09V.txt

    Filesize

    603B

    MD5

    d666e74d67e8429d3857e257faa39f0b

    SHA1

    beb72111e71ef7784ee2ae45db5db818faec6a4b

    SHA256

    9787a45cd560bebc13aafef2f3af6667638a38505ff75dd44de463b08abc2ebb

    SHA512

    fcb8d92157a49b30851ffde4439a9250648b429dd1594155f70513ae8ccf0ee10cbe4dbc3afefe21ae12ce95765c0e8c5acb492b75c830274fcacbf4d5fc7b02

  • memory/1520-54-0x0000000074D61000-0x0000000074D63000-memory.dmp

    Filesize

    8KB

  • memory/1520-55-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB

  • memory/1520-62-0x0000000000400000-0x0000000000549000-memory.dmp

    Filesize

    1.3MB