Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 18:22

General

  • Target

    b26efaf760bce49571ac68ca8a086e56cf411a0098ab6fd92dc76427ed1638c7.exe

  • Size

    3.7MB

  • MD5

    59f973362a017d73908f1b5e644b3e92

  • SHA1

    7587ec3ccb0f63f2d454d39f96a9888d6b29e3fe

  • SHA256

    b26efaf760bce49571ac68ca8a086e56cf411a0098ab6fd92dc76427ed1638c7

  • SHA512

    9e58ad431d75f1586f43a1c31f95ddef22c68cdf6f83e41af146ab8c562e41488558f463a24d65c627ab16180add38137ca68e48620b7592b7dd621760c36765

  • SSDEEP

    49152:GKONXlQJ6NB9gA+FnLl3CeMwFZ0+TmM3HuETOsmVF8I8fD9vxBtCKd9EZ:oNJH+xLtCGtirsmb8vRZBLYZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b26efaf760bce49571ac68ca8a086e56cf411a0098ab6fd92dc76427ed1638c7.exe
    "C:\Users\Admin\AppData\Local\Temp\b26efaf760bce49571ac68ca8a086e56cf411a0098ab6fd92dc76427ed1638c7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe
      C:\Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\18DJQUYc.exe
        C:\18DJQUYc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
    • C:\Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe
      "C:\Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe"
      2⤵
      • Executes dropped EXE
      PID:1440
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.waig8.com/forum.php?mod=forumdisplay&fid=80
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1392
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://shop110665107.taobao.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:308
    • C:\Windows\empty.exe
      C:\Windows\empty.exe 1056
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:816

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\18DJQUYc.exe

          Filesize

          680KB

          MD5

          80ce85ebf76d47cf796e9dc816f5dcba

          SHA1

          d70c7591a9af0e3ce93ac04caff050982b9c1932

          SHA256

          9c26d02e74a1f8c385e78a86dc47934ba715f2e6dbbf629624fb6c1a7e1a3600

          SHA512

          091d10a63c5bdd2c00471f34ffa7b8b473d5c175660d1e3c8b2ebecbef3bef703fa7b22d16f3e4e82484b9891008a0da50fa2006f8ff06fc3b6c9c981c2f47d2

        • C:\18DJQUYc.exe

          Filesize

          680KB

          MD5

          80ce85ebf76d47cf796e9dc816f5dcba

          SHA1

          d70c7591a9af0e3ce93ac04caff050982b9c1932

          SHA256

          9c26d02e74a1f8c385e78a86dc47934ba715f2e6dbbf629624fb6c1a7e1a3600

          SHA512

          091d10a63c5bdd2c00471f34ffa7b8b473d5c175660d1e3c8b2ebecbef3bef703fa7b22d16f3e4e82484b9891008a0da50fa2006f8ff06fc3b6c9c981c2f47d2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d3d688145861a51948e0151f0b1c5fea

          SHA1

          bbf83a3d2acda7bb6dd80139dc57a5ebaeb2bacb

          SHA256

          7d666791471bbc616d120e3004a86318637473032d2c157a141c9a91e5320e69

          SHA512

          40268a895be74f43cb507347a215c39af4750decf991d7c8298c33f9c36ae9d4789f77cb97f99b3899ad47e2fc240d05d279f8aea517ee5e1cd5a916011cb964

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A8DBB0C1-6F42-11ED-AD72-5E7A81A7298C}.dat

          Filesize

          5KB

          MD5

          7d5765897408f8944e95ccb6fed90540

          SHA1

          e1ef7f68bdd0b0968028187f4107fcaeb20650b2

          SHA256

          413c86cba8f0d07baaabd4f752bd941a12990c7f774b5d9193d5096187bdda11

          SHA512

          8c1f8ffb025cb3566578c1f6d1f40688f7d722a5b0a0be89d475139c373aa12e4f81e1ec95517ccf1acae92a95de847cb99e3a1d12ae2044c9f08f5561699e09

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A8E07381-6F42-11ED-AD72-5E7A81A7298C}.dat

          Filesize

          4KB

          MD5

          53fd0ccfa3da7e6c272adabba4b1c869

          SHA1

          1d6a92759cddb59b5deb83832e5acdd56e47d1c4

          SHA256

          d499eea2372e787e4391c5f5d1fca97fb2c9f42ea8a9f28f07fb340bd8fd9bb0

          SHA512

          c0a0e2766aa2d46df120eb6c7b1383ef0be8b22af78c154bbaf46e38f927a04869dcf2b5165d84ba9574d1ac8bdcd400183006433b8281a9fc8c8f592f6ee3ea

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          20KB

          MD5

          1a0c8cd17996c695939fe80621f88fc0

          SHA1

          b2bb494767fcaeb0316bd3ae690404f5ed5a24be

          SHA256

          6d64ae491f5b979244956928735c37af674be80f9faf66884f6b47c635d4c446

          SHA512

          6fdff83d1b09150662e83ce926d54fc33c12ff17e254d00125e8c392591a8338d92dfdd4bc71d85f4ab818c43ebea15c997d6334395f36bbd87d3662629d645c

        • C:\Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe

          Filesize

          680KB

          MD5

          80ce85ebf76d47cf796e9dc816f5dcba

          SHA1

          d70c7591a9af0e3ce93ac04caff050982b9c1932

          SHA256

          9c26d02e74a1f8c385e78a86dc47934ba715f2e6dbbf629624fb6c1a7e1a3600

          SHA512

          091d10a63c5bdd2c00471f34ffa7b8b473d5c175660d1e3c8b2ebecbef3bef703fa7b22d16f3e4e82484b9891008a0da50fa2006f8ff06fc3b6c9c981c2f47d2

        • C:\Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe

          Filesize

          680KB

          MD5

          80ce85ebf76d47cf796e9dc816f5dcba

          SHA1

          d70c7591a9af0e3ce93ac04caff050982b9c1932

          SHA256

          9c26d02e74a1f8c385e78a86dc47934ba715f2e6dbbf629624fb6c1a7e1a3600

          SHA512

          091d10a63c5bdd2c00471f34ffa7b8b473d5c175660d1e3c8b2ebecbef3bef703fa7b22d16f3e4e82484b9891008a0da50fa2006f8ff06fc3b6c9c981c2f47d2

        • C:\Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe

          Filesize

          680KB

          MD5

          80ce85ebf76d47cf796e9dc816f5dcba

          SHA1

          d70c7591a9af0e3ce93ac04caff050982b9c1932

          SHA256

          9c26d02e74a1f8c385e78a86dc47934ba715f2e6dbbf629624fb6c1a7e1a3600

          SHA512

          091d10a63c5bdd2c00471f34ffa7b8b473d5c175660d1e3c8b2ebecbef3bef703fa7b22d16f3e4e82484b9891008a0da50fa2006f8ff06fc3b6c9c981c2f47d2

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X58ZQ6RW.txt

          Filesize

          603B

          MD5

          495953a40e545bf880fd6f24c8cdc425

          SHA1

          16ae94275719028ed23e23258a091c534c5f18ee

          SHA256

          9f08ee593672f1894ed91fb0d1d3477ec73831ad98c494134333afa75599ec8b

          SHA512

          6b3c11ada4bfdbdaebca98d3098e5d15807f8369b4c11a7338801ccdb2ac276acd26a179b479a3a4be4a1d9527ddca3c7f8b29891626d28f4c9bb50924cac87f

        • C:\Windows\empty.exe

          Filesize

          9KB

          MD5

          523d5c39f9d8d2375c3df68251fa2249

          SHA1

          d4ed365c44bec9246fc1a65a32a7791792647a10

          SHA256

          20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

          SHA512

          526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

        • \Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe

          Filesize

          680KB

          MD5

          80ce85ebf76d47cf796e9dc816f5dcba

          SHA1

          d70c7591a9af0e3ce93ac04caff050982b9c1932

          SHA256

          9c26d02e74a1f8c385e78a86dc47934ba715f2e6dbbf629624fb6c1a7e1a3600

          SHA512

          091d10a63c5bdd2c00471f34ffa7b8b473d5c175660d1e3c8b2ebecbef3bef703fa7b22d16f3e4e82484b9891008a0da50fa2006f8ff06fc3b6c9c981c2f47d2

        • \Users\Admin\AppData\Local\Temp\Q³è´óÀÖ¶·.exe

          Filesize

          680KB

          MD5

          80ce85ebf76d47cf796e9dc816f5dcba

          SHA1

          d70c7591a9af0e3ce93ac04caff050982b9c1932

          SHA256

          9c26d02e74a1f8c385e78a86dc47934ba715f2e6dbbf629624fb6c1a7e1a3600

          SHA512

          091d10a63c5bdd2c00471f34ffa7b8b473d5c175660d1e3c8b2ebecbef3bef703fa7b22d16f3e4e82484b9891008a0da50fa2006f8ff06fc3b6c9c981c2f47d2

        • memory/1056-54-0x0000000075A71000-0x0000000075A73000-memory.dmp

          Filesize

          8KB