Analysis

  • max time kernel
    148s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 08:49

General

  • Target

    f03277fae0252781be3b81c4a4d18be6f6dfc28eb04c264043e07ae88c3562ed.exe

  • Size

    1.4MB

  • MD5

    9dc6c167789e256c7b746a51d7c5d141

  • SHA1

    fd8ba4294d2898307e43d4cf83a7b71e2fbd43b4

  • SHA256

    f03277fae0252781be3b81c4a4d18be6f6dfc28eb04c264043e07ae88c3562ed

  • SHA512

    25cecdffbefb9894c6e2ff49f1b21f27ca2f3dcfdac51836668894f679ceb8f735534df77182a6f2dbb72f584fb39c8a6b06e7172c9d3fa286c35d217efe126c

  • SSDEEP

    24576:yWPiohfget62VyTAbIbQMrOiD7ELeWpHMMlBurDTm5BV6QrechHjsTnnGp:yIhheAsbQSEL/pHMN3mPVh6chITnGp

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f03277fae0252781be3b81c4a4d18be6f6dfc28eb04c264043e07ae88c3562ed.exe
    "C:\Users\Admin\AppData\Local\Temp\f03277fae0252781be3b81c4a4d18be6f6dfc28eb04c264043e07ae88c3562ed.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://tcdgy21.qjwm.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1700
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:603140 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1152
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:472074 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1708
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://tcdgy21.qjwm.com/
      2⤵
        PID:1632

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZV4C087O.txt

      Filesize

      533B

      MD5

      e9d4a6756b158c5b57d42167ff6af16d

      SHA1

      e490272b195a792fb3d4a1de6c1d47075456387c

      SHA256

      e422907e0969e04d67e44245a299e9f83b390e314fd7acbdb7374d4ec01f825d

      SHA512

      5cac719040f0a2beadf724cac4c85b4d5ce24c61a38d6ab1a906459f3953fc661e301dac7fe7223c9947de31a5e89d2eded3f4fae5c7ae7edcc391b98d9c2a4a

    • \Users\Admin\AppData\Local\Temp\SkinH_EL.dll

      Filesize

      86KB

      MD5

      147127382e001f495d1842ee7a9e7912

      SHA1

      92d1ed56032183c75d4b57d7ce30b1c4ae11dc9b

      SHA256

      edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc

      SHA512

      97f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d

    • memory/1352-54-0x0000000075F51000-0x0000000075F53000-memory.dmp

      Filesize

      8KB

    • memory/1352-55-0x0000000000400000-0x000000000068D200-memory.dmp

      Filesize

      2.6MB

    • memory/1352-57-0x0000000010000000-0x000000001003D000-memory.dmp

      Filesize

      244KB

    • memory/1352-58-0x0000000000400000-0x000000000068D200-memory.dmp

      Filesize

      2.6MB

    • memory/1352-59-0x0000000010000000-0x000000001003D000-memory.dmp

      Filesize

      244KB

    • memory/1352-60-0x0000000000400000-0x000000000068D200-memory.dmp

      Filesize

      2.6MB