Analysis
-
max time kernel
135s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe
Resource
win10v2004-20220901-en
General
-
Target
5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe
-
Size
4.8MB
-
MD5
00deeefb43fd5a107e0731398fd07d8b
-
SHA1
470d2b1a3aa532682904945cb8f91f08d5c36249
-
SHA256
5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9
-
SHA512
c1af291d5426e13ad5bce844d81511fa11b0e77bc6ef41cb80925bbdce26decf70e9438a097254025b1464c31a6e6c3072ca3067e46785a2e25d51777d47c755
-
SSDEEP
98304:adLsdM4h7w67ieZeWFmsGYeiu/Euzzui3w+g33bjSbr201gOVplH39rPOKKC:Y4bt/FjeiuhzzF3w+gHiBrBXdmK9
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe 2008 5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe"C:\Users\Admin\AppData\Local\Temp\5f547b0cd4379051663c45e832c2fbc751589714f1164d5eed2692dc051c53d9.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5aea3ac67fa68fd3f00edfbf9b43a2770
SHA1aa59d1a4311c42b612ee66a027f224261beebbc3
SHA256f4530c734e3ce6253ffa6e5d755d61e4709ab9fc3b0eee3d4cdb89ec89c48bd2
SHA512ffb6abc624d50ae8bc9c83ff518cb532dfd076f107077dceaf0e23d11c186a18671a5f538270be8b0b986e41ad1981a3606995046a6ee7b6b64a33c83ed72df9
-
Filesize
7KB
MD592debab0caea94c3e571e892fdde60dd
SHA1fcd1f711b3c649b5cf5cc134e19524489084e456
SHA256508b06710e1c3d4456d14a28ffa89c42097a9388ce44a6148ee1a3a3d5a26bcd
SHA5122169d071c0c570b236c7224141dfb460a4cd6eb6e2e7fdf081c8d88d9173f639881d0dc2e33bc4881432637fb1a7336b7815236a70cf5ee638f8142d787a94fc
-
Filesize
22KB
MD52312a7ac514325c2f1efc6f4cfdecd61
SHA17d12b05a867ec6d40f174c797dc3b691e6fa2408
SHA256fb9cc3565cf89cf862665003b329be514e1fbcdef83a9ed994238800156de983
SHA512187ef38f755f1e30524e3d60d1d4188160b654f2430c0246e160d9e8971d565986010a47a9ef3c8ca99eae7e0993c8be0b2cb93345cc6f30b179206f57e54b9c
-
Filesize
18KB
MD5ae60f7858d2318f81514e01b925f74ca
SHA1292fe609aebc4f213c44d94a6c68dfb5a499f2ef
SHA2569d7ffe7082c92d85522d82faa8767bc3ef744a85455c336f99b5e8e288a6cead
SHA5129fb698c8f8154779e5957336eb57fb97c9bdf50f53245b353c21ae4a52b25b86f910fa6095e6ed74bf0812a4935df62903efe2079713e15c2168cdca6f0048be
-
Filesize
14KB
MD5a5a4cee2eb89d2687c05ef74299f0dba
SHA1b9bff5987be422887f2f402357b47db2288a1a42
SHA256cb82268b778703db75961cddef33a695a674f0dfd28b7e710b198ef2d26d3963
SHA512f485267c6239f84d294ed4b0a82f317081e6e2e0c5613bd012bbd496b9ebccb8aca6944e80f84af51d17ac13f4d83480c34edfe37a3a9508ce0e67fc9f0b96f0
-
Filesize
14KB
MD5a5a4cee2eb89d2687c05ef74299f0dba
SHA1b9bff5987be422887f2f402357b47db2288a1a42
SHA256cb82268b778703db75961cddef33a695a674f0dfd28b7e710b198ef2d26d3963
SHA512f485267c6239f84d294ed4b0a82f317081e6e2e0c5613bd012bbd496b9ebccb8aca6944e80f84af51d17ac13f4d83480c34edfe37a3a9508ce0e67fc9f0b96f0
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
9KB
MD58ced0b79f7b9033d0795aab3be6d627c
SHA190c2043ffccd068f407c624c50ac7b795db1e132
SHA256495bddc0be6e18e981db82fab9d1de55c7e269ab4ec3ff43035193bc017a307b
SHA512e38f63a342729f5ff6d0db607d7877b65c33ed19e2b5a97dd868ece8c2a3e829d4153624943444be2f0de885496161d54c1da9594bdc0a5a0bcc8b727e2facb0
-
Filesize
10KB
MD5e9a68378671dfc74e7715b47291e141a
SHA13178de37b31120525bff70ab620aa3473a01edf1
SHA256630fce9497fb76e4f72e20741593fba7c30d72e8abdc085f3848d8c3ff31603e
SHA512c17ed60f4983d853182f8be991c0f72fae03e208640442ccea0b935cd27d860a263eb962c08d05089d0c79c0556d9d266da548bf7df981483a989acc1412b24f