Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 14:32

General

  • Target

    f9cc5d9ee455df4d8d5e0ff95a49f7d2683d4399264f7f80a5b613046af63b7f.exe

  • Size

    289KB

  • MD5

    71063d75d4f61d35b8e93a3f382c62af

  • SHA1

    d6d6c699234f4e479594568cb6388f2b35159acf

  • SHA256

    f9cc5d9ee455df4d8d5e0ff95a49f7d2683d4399264f7f80a5b613046af63b7f

  • SHA512

    df9c38fb67e54fecea5e55af197ebfe4be18048654c71a1508f73f4636d4634e807ccb29ccb203d9ddc66cd3e579b8030c97815ebcd01ca66cc0ff8b8a9ae1f2

  • SSDEEP

    6144:ycDWeh7E8jB80j9VdnCOBIlgBmEy/KxzP1xpw8txFlqQqumepoWbyd8gUKSXct6K:ycDWeh7E8jB5j9VdnCOBIlgBmEy/Kxzr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9cc5d9ee455df4d8d5e0ff95a49f7d2683d4399264f7f80a5b613046af63b7f.exe
    "C:\Users\Admin\AppData\Local\Temp\f9cc5d9ee455df4d8d5e0ff95a49f7d2683d4399264f7f80a5b613046af63b7f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Roaming\010478\0212E8.exe
      "C:\Users\Admin\AppData\Roaming\010478\0212E8.exe" -launcher
      2⤵
      • Executes dropped EXE
      PID:904
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1040

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\f9cc5d9ee455df4d8d5e0ff95a49f7d2683d4399264f7f80a5b613046af63b7f.exe--.xls

          Filesize

          36KB

          MD5

          e3eed778950bbe69f99c972b73fdf985

          SHA1

          58df1211f33ea2e97d951306b227eab5e52e0e10

          SHA256

          771afcba8de5c6707b26956795e994eba9074d95fd602f494a54523f3621c7c8

          SHA512

          3e5d30f10d5a4f0fa08605e9ea2c3dc27c9a1fb61b4311def077ec297fdc70c94909616802025785dc264e021ca3f71ff2ffb961b8e9a59612bbf1ba3ba51671

        • C:\Users\Admin\AppData\Roaming\010478\0212E8.exe

          Filesize

          229KB

          MD5

          3302efce7b3e28d9c03530464313f925

          SHA1

          e1d7e9e8242917752aaaf63a3e09f46916cc8f75

          SHA256

          a7c86faf217e39da6ead685322cfc274c3cd9381d134818b8903c5d219a720c1

          SHA512

          fe2f8e92694c40c6be238d7870d72769ca82cfd0213c166ad77f96061807c70a6512f5e663b85a35d873bd8b8880c147ee3559f85d18621749eff3c05baae152

        • C:\Users\Admin\AppData\Roaming\010478\0212E8.exe

          Filesize

          229KB

          MD5

          3302efce7b3e28d9c03530464313f925

          SHA1

          e1d7e9e8242917752aaaf63a3e09f46916cc8f75

          SHA256

          a7c86faf217e39da6ead685322cfc274c3cd9381d134818b8903c5d219a720c1

          SHA512

          fe2f8e92694c40c6be238d7870d72769ca82cfd0213c166ad77f96061807c70a6512f5e663b85a35d873bd8b8880c147ee3559f85d18621749eff3c05baae152

        • \Users\Admin\AppData\Roaming\010478\0212E8.exe

          Filesize

          229KB

          MD5

          3302efce7b3e28d9c03530464313f925

          SHA1

          e1d7e9e8242917752aaaf63a3e09f46916cc8f75

          SHA256

          a7c86faf217e39da6ead685322cfc274c3cd9381d134818b8903c5d219a720c1

          SHA512

          fe2f8e92694c40c6be238d7870d72769ca82cfd0213c166ad77f96061807c70a6512f5e663b85a35d873bd8b8880c147ee3559f85d18621749eff3c05baae152

        • \Users\Admin\AppData\Roaming\010478\0212E8.exe

          Filesize

          229KB

          MD5

          3302efce7b3e28d9c03530464313f925

          SHA1

          e1d7e9e8242917752aaaf63a3e09f46916cc8f75

          SHA256

          a7c86faf217e39da6ead685322cfc274c3cd9381d134818b8903c5d219a720c1

          SHA512

          fe2f8e92694c40c6be238d7870d72769ca82cfd0213c166ad77f96061807c70a6512f5e663b85a35d873bd8b8880c147ee3559f85d18621749eff3c05baae152

        • memory/904-60-0x0000000000440000-0x0000000000464000-memory.dmp

          Filesize

          144KB

        • memory/904-61-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/1040-66-0x0000000070E91000-0x0000000070E93000-memory.dmp

          Filesize

          8KB

        • memory/1040-65-0x000000002F3D1000-0x000000002F3D4000-memory.dmp

          Filesize

          12KB

        • memory/1040-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1040-69-0x0000000071E7D000-0x0000000071E88000-memory.dmp

          Filesize

          44KB

        • memory/1040-71-0x0000000071E7D000-0x0000000071E88000-memory.dmp

          Filesize

          44KB

        • memory/1380-63-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/1380-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

          Filesize

          8KB

        • memory/1380-62-0x0000000000270000-0x0000000000294000-memory.dmp

          Filesize

          144KB

        • memory/1380-72-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB