Analysis

  • max time kernel
    70s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 02:29

General

  • Target

    804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe

  • Size

    47KB

  • MD5

    a1a95a4c16a981430df2e509f09e7911

  • SHA1

    63ad3f63566a6dea61fc6adda2c5dbed382e06af

  • SHA256

    804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356

  • SHA512

    de1da6dd2c7aa8199ea64bf81a37790a5991fcf719e9a6cebf0fe4b7dfe43cbf1d936882e1cb1809dcb7dfe18048bcce1f8f0b5309a443dec4882742578d6b89

  • SSDEEP

    768:po5PFTmNCi5ONtoZC5pLT+5sYe6SX4/5bm1qJ1W6eNXkQJ6QRa2pnaWcX0cUA5:i5N6CAIF5pLCC6SS5m1qJ1WFN9nxatzR

Score
7/10

Malware Config

Signatures

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe
    "C:\Users\Admin\AppData\Local\Temp\804499e859365f9c8076edb25bd0727ae113eb7c8cac497f0fcc068bbe891356.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.seutoba.com.br/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RYFOKTA5.txt

    Filesize

    535B

    MD5

    1f26510db0f30f4616e7bec289e64b47

    SHA1

    d84bdcb69f714ede187b919177ecce62aad26b2d

    SHA256

    ba5175d5889a0a9417316b403ac78810a7e1a29c82c224bd46e5ab543f01bbc9

    SHA512

    2c39783cb4cda2a4ad3b4bd6644dc9ff9a985657239aff97f166e818aa383396b01e4a00e510050f1fd2f08879d4c0dda35ca89bae2f4d44f065f20312c56011

  • memory/1388-54-0x0000000000400000-0x000000000043CF58-memory.dmp

    Filesize

    243KB

  • memory/1388-57-0x0000000075E11000-0x0000000075E13000-memory.dmp

    Filesize

    8KB

  • memory/1388-58-0x0000000000400000-0x000000000043CF58-memory.dmp

    Filesize

    243KB

  • memory/1388-60-0x0000000000400000-0x000000000043CF58-memory.dmp

    Filesize

    243KB