Analysis

  • max time kernel
    175s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 17:26

General

  • Target

    e5cfeaff2bc96b326dbfb3dc96de5a6d45f61bb17eb74b70a9b75c209f30cd34.exe

  • Size

    208KB

  • MD5

    0552a25f3ed1bf72603b39281ba0db7b

  • SHA1

    6957b27c04ab682677305cfd0efc5ce0f12e8ddf

  • SHA256

    e5cfeaff2bc96b326dbfb3dc96de5a6d45f61bb17eb74b70a9b75c209f30cd34

  • SHA512

    75f868a050db411c4491fa5baf454c7c4ffbac08db0e2b71910114b9ffeba775dbf22bd7344e9baa1d171d3479da1192b7633da1f163cb7666777da972345812

  • SSDEEP

    3072:MXgL+OnCA2JLxEAWLR0lGacNcP7hUPT0w8n0Eb1OSoefWlIv:QgC2A/6tdNixnDJoeU

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5cfeaff2bc96b326dbfb3dc96de5a6d45f61bb17eb74b70a9b75c209f30cd34.exe
    "C:\Users\Admin\AppData\Local\Temp\e5cfeaff2bc96b326dbfb3dc96de5a6d45f61bb17eb74b70a9b75c209f30cd34.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\e5cfeaff2bc96b326dbfb3dc96de5a6d45f61bb17eb74b70a9b75c209f30cd34.exe
      "C:\Users\Admin\AppData\Local\Temp\e5cfeaff2bc96b326dbfb3dc96de5a6d45f61bb17eb74b70a9b75c209f30cd34.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\BGVWT.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "chrome.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\temp\chrome.exe" /f
          4⤵
          • Adds Run key to start application
          PID:1836
      • C:\Users\Admin\AppData\Roaming\temp\chrome.exe
        "C:\Users\Admin\AppData\Roaming\temp\chrome.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Users\Admin\AppData\Roaming\temp\chrome.exe
          "C:\Users\Admin\AppData\Roaming\temp\chrome.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2036
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:796
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:796 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BGVWT.bat

    Filesize

    143B

    MD5

    809151c6427bb50acddfd3ab4ef9514b

    SHA1

    d8786a949c372f73750463aab728dd3cf5306813

    SHA256

    02432a4daa99ee328c69a509aaa5cc87a7eb1faa6f465361720dccd33e8e8e86

    SHA512

    1eb057896dee7d2beb3e70040f011a12f63e9036e388f168bf9d573620bdb1e6977e7749f1645ed58a0896ed50769dbd0785e21c358ecd16f0c3cab856356ead

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\G8H0NLN6.txt

    Filesize

    535B

    MD5

    73db31229ae3bc8b99f0dca95c089292

    SHA1

    70100db6b4833e362afc09fd32581cb63e583e3a

    SHA256

    6edd8863f28ba803c0d77858b89ee939b3db9ef0f7e094a81ea639c0e492b5a2

    SHA512

    5ee6601eb9f3607ca85261bb8b65496ae4d975ea454a3989ebba624a471f129c8e2d3d289ceb3d0b7bea9ceece4c7b616345e2de52c83679ed3617c6a61eb4ad

  • C:\Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • C:\Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • C:\Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    5a144bb48489a910b6030629c4c5dcc4

    SHA1

    d27bb86b588e4b8b3a9f8c434464c06596198b3c

    SHA256

    cbe87c6f9010c5dff788a5db5d193c3c0def224c6b2869968734680e72dcc5ef

    SHA512

    fd2c24624c58aa16a6ed3cfe9fef17ec5c3196b3e6947b7aace9e902dc18d9da85dab7098b4428ed453fdaa6b177caa80dafe44961b3d195283bb748d764d631

  • memory/1428-56-0x00000000005DF000-0x00000000005FE000-memory.dmp

    Filesize

    124KB

  • memory/1524-83-0x000000000059F000-0x00000000005BE000-memory.dmp

    Filesize

    124KB

  • memory/1788-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-61-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-66-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-65-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-58-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-70-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB

  • memory/1788-69-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-96-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1788-59-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2036-99-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2036-101-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB