Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 06:50

General

  • Target

    188cfec392ec2770e2074f28d894e9f7dc36c331b7f5015104ecd59b383df854.exe

  • Size

    2.0MB

  • MD5

    ea89fde187539d7d189da9de625a9331

  • SHA1

    ebbff1862364d8c48f34766f2c773291bddfffca

  • SHA256

    188cfec392ec2770e2074f28d894e9f7dc36c331b7f5015104ecd59b383df854

  • SHA512

    a5fe0c16c83717a0e4e8c1cd90101dc1582dcf41c9f1b3c9f9a453f66f609291ef608ab37e4d2ffc230b21054a80d1b87603e347eadc563f59616ed978765142

  • SSDEEP

    49152:wF8+EDgUqEq84phgn0oENum7xIaCodPOJszwd8fbtSZn:i8NehZ8uxIaCood8fb8h

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\188cfec392ec2770e2074f28d894e9f7dc36c331b7f5015104ecd59b383df854.exe
    "C:\Users\Admin\AppData\Local\Temp\188cfec392ec2770e2074f28d894e9f7dc36c331b7f5015104ecd59b383df854.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.51ztzj.com/win7/index.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:660

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d5b31af4d41f575f6c94c3c388f19737

          SHA1

          56c40eb5af4fb97438726a278377caedba12899f

          SHA256

          65abec0ed1d6fdba2b2a11c152f78a5785cc341c8644452f3eef8361943cf3d0

          SHA512

          cc13ba4f61f7d1c259b71a766fd4c3883386dc52b9360126b07d740798d4c5779f2a4f2998f19551e1c6032077db1258a5f26063c52fd65c1fd1579c5b3e19f1

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          13KB

          MD5

          39fbd31d747dd52951280fa03cd23d69

          SHA1

          d1ca9162634aeb1187729c6bc92bada11b90d247

          SHA256

          cb5a73c5ab6d59a49ac905b3c39b9fa737ae1708a74cfac5d00eb2c8aacb7431

          SHA512

          f9debe1d6514f86eb59e566b347fad0a38154315a324c8faa2e8757589778d23940db164166b5e47a1d922c40d21c28a5b09f15520915c35b0a1c4ba47ff1d1a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VYON39FL.txt

          Filesize

          603B

          MD5

          9257288a50a049299d4b39b60c0ea095

          SHA1

          e46dc98c39c9778bf5d6cc24fd1eb39f14189a60

          SHA256

          aa362ae8c4b0502f40d014db8f1b3dca74aab32ef1ac2164391d53f16952202b

          SHA512

          bdf028ec7e2faa746ba6be87fb05583ab94d247de0b983f0194006f8d995a016b1c2beed459b160a89030b7babc96d03642fb974c7536ddf504303ab57f7dde4

        • \Users\Admin\AppData\Local\Temp\nsy1E1D.tmp\Splash.dll

          Filesize

          4KB

          MD5

          ff8340b98dbd0c4f38d06627b97637a4

          SHA1

          aae736a26fbb1ed5e9fddd956115699a910b3435

          SHA256

          6dad450c8b77a4827899eb54347d6f0c3a225c56920b0565dbc6b63c33bc176f

          SHA512

          58eda9fdc3e69c651f96d2994c76afd9e09624de5622177996b3ca9cfb9fbadb4489996ac49d220de16963acc734853239b807c65c50f79d39f4b292925ec685

        • memory/1720-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

          Filesize

          8KB