Analysis

  • max time kernel
    107s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 07:48

General

  • Target

    6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe

  • Size

    2.0MB

  • MD5

    1ef927006683a9187cc55c8efe36e256

  • SHA1

    bccb3687d7ce6caa1c8c6d1ee21e99aca9acf21c

  • SHA256

    6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b

  • SHA512

    0d76cf765eaeaef62f104fc9c6b2d9bb2a401c39e72df7fb2199b2348b5b3f482725f098125b6d443f0dcccef2aa495126a5b1e025be0df1b9b52ceec67d87b4

  • SSDEEP

    24576:uBoJKz7+Ze0/r2PEw55c2wTYs42cYbDyGWBVGZu8BlscURb+bo98Ef1gFIo4KGqI:upz7G2PxJhAyGWv4uAA+cRgFIAG2SWs

Score
8/10

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe
    "C:\Users\Admin\AppData\Local\Temp\6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.cnlna.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1820
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /u /s C:\Windows\system32\SuperEC_Hook.dll
      2⤵
      • Loads dropped DLL
      PID:1264
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x570
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\KKEA7BGZ.htm

    Filesize

    427B

    MD5

    774d13bb0fecd8fd1b141abc974c2840

    SHA1

    683c8cfb5b5d2fdaf704d9fd8c11885a024e0ee4

    SHA256

    4a89eebe118988c98ea41bc4540c8972a2e35ff2a616b933178dce75415191b8

    SHA512

    0759bc9280458afcba4d8a86fb179c98a34f985049d50b4a14c4949d7c99a5c689474a77c9f3564e2ae06a891d53319bf82626ff60cd858e4dda6b93d16e5792

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DTFA6P73.txt

    Filesize

    608B

    MD5

    d5c0e4ff8f9b0d693d20964acd741125

    SHA1

    f04ba02fdb0cb6000a2a4701e6f87ff7a067fea8

    SHA256

    fc7289a019969340bda457446a1d9a5b8fe5447f9bc127d5110eeb6a5c2e4877

    SHA512

    fb30119ef77db4369a3c077547cd561d5c216f7bd87528b7b8a21273d9805355daa557811cba78b9f5e66bf309de1f59f32e4f875d866bb9901541b779bbfff9

  • C:\Windows\SysWOW64\SuperEC_Hook.dll

    Filesize

    368KB

    MD5

    6446f02463634295797ff698eb7eb92e

    SHA1

    64a20417acf7c9bd67efc601236c85fa640426a8

    SHA256

    53022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33

    SHA512

    eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe

  • \Windows\SysWOW64\SuperEC_Hook.dll

    Filesize

    368KB

    MD5

    6446f02463634295797ff698eb7eb92e

    SHA1

    64a20417acf7c9bd67efc601236c85fa640426a8

    SHA256

    53022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33

    SHA512

    eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe

  • memory/864-83-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-89-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-63-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-67-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-65-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-69-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-71-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-75-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-73-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-79-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-54-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB

  • memory/864-85-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-81-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-61-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-91-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-93-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-95-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-87-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-97-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-77-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-98-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-55-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-59-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-57-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/864-56-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/1264-104-0x0000000016080000-0x0000000016152000-memory.dmp

    Filesize

    840KB

  • memory/1264-100-0x0000000000000000-mapping.dmp