Analysis

  • max time kernel
    125s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 15:43

General

  • Target

    d0cdd773a4d196610e6698870bda314fa938b3d238de374b90eef3ad3a5e7e6d.exe

  • Size

    2.4MB

  • MD5

    052460e13b2c9bd8dccb71b2ff5bf9f5

  • SHA1

    19afe1ed16a46ae4fab1c576a0559c7107e3a539

  • SHA256

    d0cdd773a4d196610e6698870bda314fa938b3d238de374b90eef3ad3a5e7e6d

  • SHA512

    6533e07272b257216d6c12771f347dc782a36956c4439c2168a389c3651c0bfc99104c32a5255cde2997e39ef7116255466e7b64107cd1b2db2167a60f4294ef

  • SSDEEP

    49152:tkIXJV+daSwqZCv5zpgFNtWPxn6MXtztZDwJlcjtMgEnoSE5W:qa8EKZGSFNs6KFtZDwzcZMgEnoSE5W

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0cdd773a4d196610e6698870bda314fa938b3d238de374b90eef3ad3a5e7e6d.exe
    "C:\Users\Admin\AppData\Local\Temp\d0cdd773a4d196610e6698870bda314fa938b3d238de374b90eef3ad3a5e7e6d.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.azpan.com/space_lsfz_2250.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1824

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7Z8HUGP7.txt

          Filesize

          539B

          MD5

          1918150f7759072192150f9a25fdc167

          SHA1

          255edbf4ef88e0463a6cae9c30e48e12f2c0e7bf

          SHA256

          02dd4816c08faa859c9fdd26d2d9b6ac8e0a778880cda803cabf5dc233945183

          SHA512

          cd43e93c7a9a6c96f89b176666baae67339193ced4441f34360b9a1e3c66c2cc2e2a17795f801304c472b46cfb03af13b10aabe6adb9e3e57109ef3a56f44e81

        • memory/852-79-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-81-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-56-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-59-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-61-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-63-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-65-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-67-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-69-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-71-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-73-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-54-0x0000000074E41000-0x0000000074E43000-memory.dmp

          Filesize

          8KB

        • memory/852-57-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-87-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-77-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-93-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-91-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-95-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-89-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-97-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-85-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-83-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-75-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-98-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/852-55-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB