Analysis

  • max time kernel
    135s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 11:02

General

  • Target

    cfxindong.exe

  • Size

    1.4MB

  • MD5

    2db0597e0fbbf3aab93dea3ca76db883

  • SHA1

    9b431e5d427176fe9bca82464322be3f3a723187

  • SHA256

    b98932763d82836e2de77e3043b1687db27a17ea98fc1532818032d4ea9f2543

  • SHA512

    7cc86eddb9be47dda8bc03197319ba686f46ff765b8bea2260ba308f720d7ccee73dd868b7ee92eb973f3a1a15986039659c09c572cae2cb6477ee01dbf223ca

  • SSDEEP

    24576:YOhS6Gp4FvrTVAoByFq45oMWTSV0Oq20dGIIxocDIukNdl5ThASKYReX5kPTwHH:NndrTtMquojTSCOIOlCTyfX5kUHH

Score
8/10

Malware Config

Signatures

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfxindong.exe
    "C:\Users\Admin\AppData\Local\Temp\cfxindong.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.cfxindong.com/#network
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:808

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2O13BI7D.txt
    Filesize

    606B

    MD5

    e43537d67e42ed528eb98bca65745bc3

    SHA1

    9b2b64f6c526ea5a63986e2a31f83b78ae894795

    SHA256

    af720b184ae94ef335ed632ab2e425fe06a193d5d9e3beff99b45b0fd4353517

    SHA512

    f8b462a83580c3a7ba2dafc7ca9a08b3727013743f60be57a0a9c5af2531a3a25734e16f7eed4b374605ca71c27e9ab667e51b905036cec51ea24d1c1c697f38

  • memory/2020-54-0x0000000000400000-0x000000000072E000-memory.dmp
    Filesize

    3.2MB

  • memory/2020-55-0x0000000075451000-0x0000000075453000-memory.dmp
    Filesize

    8KB

  • memory/2020-56-0x0000000000400000-0x000000000072E000-memory.dmp
    Filesize

    3.2MB

  • memory/2020-59-0x0000000000130000-0x000000000013C000-memory.dmp
    Filesize

    48KB

  • memory/2020-60-0x0000000000400000-0x000000000072E000-memory.dmp
    Filesize

    3.2MB

  • memory/2020-61-0x0000000000400000-0x000000000072E000-memory.dmp
    Filesize

    3.2MB