Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 07:09

General

  • Target

    9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf.exe

  • Size

    722KB

  • MD5

    a7653be2c395c8919b16050ca4d2a735

  • SHA1

    9599c03484f016971982ac4366c829a710bd8aa5

  • SHA256

    9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf

  • SHA512

    0293a2a1cbf46d6b991da259d7e2cbc130577d0f3a36f1be4389fbbb3c80597f38d713ad285b96a469d9836fb3a1df0b8a2eb7a911be6da767b3fd7fa35ca78a

  • SSDEEP

    6144:Mc5DI5J2b4YX0ayv8a7JRpyG9AN2UeQY0yzcPSHpLUYQdeNgVmn/l4EI8XuGJHmj:x+mxDyv8GAoUegic8pLUYQANZ//eOGr

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf.exe
    "C:\Users\Admin\AppData\Local\Temp\9de95b403fb8dc4144f097ff36617164388af2134867a13edf738771436f84bf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\mhzi.exe
      C:\Users\Admin\AppData\Local\Temp\\mhzi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=mhzi.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1684
    • C:\Users\Admin\AppData\Local\Temp\chrome.exe
      "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\vbc.exe
        C:\Users\Admin\AppData\Local\Temp\\vbc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
            PID:1928
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              5⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:280
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\vbc.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\vbc.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1616
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\vbc.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\vbc.exe:*:Enabled:Windows Messanger" /f
              5⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:1280
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1420
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              5⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:1756
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\chrome.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\chrome.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:276
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\chrome.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\chrome.exe:*:Enabled:Windows Messanger" /f
              5⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:1324

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\chrome.exe

      Filesize

      245KB

      MD5

      ac6cd9f9612a853ee5b8bed06976c87f

      SHA1

      5df9942ab8c5dd06990bf356ed9c16f5d8c92f62

      SHA256

      fd16e2fe6e9886afa396baf17154cd2e2cc3ea6ac310edb82cd883ac469a8655

      SHA512

      0729294bfab8ab817363633b910ac39a8d867c9edfdc2da00bc07edd1ad9a74e79c6291fddf96cf437f3611225d20fc111b4b3755df24c2f86a71228374fac46

    • C:\Users\Admin\AppData\Local\Temp\chrome.exe

      Filesize

      245KB

      MD5

      ac6cd9f9612a853ee5b8bed06976c87f

      SHA1

      5df9942ab8c5dd06990bf356ed9c16f5d8c92f62

      SHA256

      fd16e2fe6e9886afa396baf17154cd2e2cc3ea6ac310edb82cd883ac469a8655

      SHA512

      0729294bfab8ab817363633b910ac39a8d867c9edfdc2da00bc07edd1ad9a74e79c6291fddf96cf437f3611225d20fc111b4b3755df24c2f86a71228374fac46

    • C:\Users\Admin\AppData\Local\Temp\mhzi.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • C:\Users\Admin\AppData\Local\Temp\mhzi.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • C:\Users\Admin\AppData\Local\Temp\vbc.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • C:\Users\Admin\AppData\Local\Temp\vbc.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\INV4BB9G.txt

      Filesize

      539B

      MD5

      1bddcd57a6cad7e7155bbbf0c31ac346

      SHA1

      628792a7660866e22ca825e1923deb643acd5b69

      SHA256

      4351b25dd138dc0dd137796955c43151e8430aa27268e88d8cc4a90b5f7500c6

      SHA512

      52adbb396ba75c92877daf1dce7dce3ef4c1f0d90efac9f5b2f21f4a6ca7b1282990cbbb88b536e0e97bc1dd8f138a0157e5cb9a17dbd2888f3a5b7beaeecd41

    • \Users\Admin\AppData\Local\Temp\chrome.exe

      Filesize

      245KB

      MD5

      ac6cd9f9612a853ee5b8bed06976c87f

      SHA1

      5df9942ab8c5dd06990bf356ed9c16f5d8c92f62

      SHA256

      fd16e2fe6e9886afa396baf17154cd2e2cc3ea6ac310edb82cd883ac469a8655

      SHA512

      0729294bfab8ab817363633b910ac39a8d867c9edfdc2da00bc07edd1ad9a74e79c6291fddf96cf437f3611225d20fc111b4b3755df24c2f86a71228374fac46

    • \Users\Admin\AppData\Local\Temp\chrome.exe

      Filesize

      245KB

      MD5

      ac6cd9f9612a853ee5b8bed06976c87f

      SHA1

      5df9942ab8c5dd06990bf356ed9c16f5d8c92f62

      SHA256

      fd16e2fe6e9886afa396baf17154cd2e2cc3ea6ac310edb82cd883ac469a8655

      SHA512

      0729294bfab8ab817363633b910ac39a8d867c9edfdc2da00bc07edd1ad9a74e79c6291fddf96cf437f3611225d20fc111b4b3755df24c2f86a71228374fac46

    • \Users\Admin\AppData\Local\Temp\mhzi.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • \Users\Admin\AppData\Local\Temp\vbc.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • memory/276-99-0x0000000000000000-mapping.dmp

    • memory/1160-69-0x0000000000402000-0x000000000040F600-memory.dmp

      Filesize

      53KB

    • memory/1160-58-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/1160-59-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/1160-63-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/1160-65-0x000000000040F59E-mapping.dmp

    • memory/1160-64-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/1160-68-0x0000000000402000-0x000000000040F600-memory.dmp

      Filesize

      53KB

    • memory/1160-61-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/1280-100-0x0000000000000000-mapping.dmp

    • memory/1324-102-0x0000000000000000-mapping.dmp

    • memory/1420-98-0x0000000000000000-mapping.dmp

    • memory/1600-56-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1600-77-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1600-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

      Filesize

      8KB

    • memory/1600-55-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1616-97-0x0000000000000000-mapping.dmp

    • memory/1716-80-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1716-73-0x0000000000000000-mapping.dmp

    • memory/1716-90-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1716-78-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1756-101-0x0000000000000000-mapping.dmp

    • memory/1860-85-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1860-82-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1860-83-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1860-87-0x00000000004013D8-mapping.dmp

    • memory/1860-103-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1860-86-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1928-96-0x0000000000000000-mapping.dmp