Analysis

  • max time kernel
    141s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 10:55

General

  • Target

    a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2.exe

  • Size

    164KB

  • MD5

    52b5e253b8487ccce887c312b1f2f141

  • SHA1

    ea17c16c6c6f3960c79d61b2aa0d3f0f1813d8bc

  • SHA256

    a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2

  • SHA512

    96525bc4987f1cfcbb5e4bebc8662097596e67f3d46baee2b18fc11f249372cecd2a002c649b835784776bc830358490d07b96d75995f764686c811d7969db48

  • SSDEEP

    3072:sf0LEDbSNJcsNviT3lX2ywnIVtXSpHlQkT:TIKt6T1G8Xk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2.exe
    "C:\Users\Admin\AppData\Local\Temp\a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://me2.do/5EHfV7Z
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TC1ZWA7S.txt

    Filesize

    603B

    MD5

    1ea5bcb1916f839bcd1cad969c8d8188

    SHA1

    595e8494b24fbeb437a6adcc7e2fec1b452d9730

    SHA256

    2c6366899e0b40a44d2a952ebb98361a65dd9c1bad33587050c4c56faa01c6d0

    SHA512

    6c6117d4c98b6f775db20f69bc14a2caacdf68e00605036eeafb0a63fba79fba9c36b292157081d4a93e922c72ad88b15347ea9f85e9983b8fa8ad1b98258ce3

  • memory/552-54-0x0000000075131000-0x0000000075133000-memory.dmp

    Filesize

    8KB