Analysis

  • max time kernel
    257s
  • max time network
    360s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 10:46

General

  • Target

    1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe

  • Size

    164KB

  • MD5

    1034f929741855e639d0090a768468a3

  • SHA1

    8dc5cb38ed5c25615bffbf2e20f16493665e4986

  • SHA256

    1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d

  • SHA512

    64eb59fa9e40eef9dd6e80ddd44654b45f89de296fc6fcd77c5d3af8caff70ac9a824fde4a26732cfbd22b42bc7d66d45b2efb4e2cd5978937aba06383834eb7

  • SSDEEP

    1536:qNtiyAHGX7PI5BzXjMDO/9XEThz4a7+hKMNq5qnDoMfeZmEo7fblnbONDSwW+lpw:utibsPIQDGx+MqmK6q0MsgEb0O+lQ2C

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe
    "C:\Users\Admin\AppData\Local\Temp\1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://me2.do/G8yFKB4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T9YYZB5O.txt

    Filesize

    601B

    MD5

    bc4115e1ddb3d44dd8f0847c8547999f

    SHA1

    7d1c7d2b2f518422573d816ab2afbc7dbe68444d

    SHA256

    4301ed829c811c8685d4bad449618ebd35943715b1b8e6f270842a8cf7217ad9

    SHA512

    de10790cdcca007568f655e89497e19a7b29319d0dd9420731b38e67e7e7086adb6c6dd844ad1f6bfaffa6d5131d533794f145c64a0c0076bc937b836ae94932

  • memory/560-54-0x0000000075551000-0x0000000075553000-memory.dmp

    Filesize

    8KB