Analysis

  • max time kernel
    90s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 17:19

General

  • Target

    cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f.exe

  • Size

    204KB

  • MD5

    d1da4871924d59fe6667f5c753eb91d6

  • SHA1

    e9f4ce044b5c38c43e6a023b8ec93dda482046be

  • SHA256

    cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f

  • SHA512

    a7bf767177715880308a08318b55fbbcf51b37b507098a2d36c4d173234900399359db4a1877a803ce879282253a4cc61df8f54476aca7ad9ecb1d44efe39b85

  • SSDEEP

    1536:s6KF7Mz2YP3hLOcsckFV72zwlLsJX0Cgf819pQOgICvZGIHaCp1uXnHATsg/csEn:t53lHkSwlLba9p92vIFHADH1+ML7ny

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f.exe
    "C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f
      2⤵
        PID:1324
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c C:\Users\Admin\AppData\Local\Temp\12611.exe
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Users\Admin\AppData\Local\Temp\12611.exe
          C:\Users\Admin\AppData\Local\Temp\12611.exe
          3⤵
          • Executes dropped EXE
          PID:1616
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\CFC4C1~1.EXE > nul
        2⤵
        • Deletes itself
        PID:916
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:1176

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\12611.exe

      Filesize

      14KB

      MD5

      90a241b997af67de416c736f04862248

      SHA1

      e42e4a9612f50dd4e29d5cb9faf6b0a56691f7cb

      SHA256

      fccfd9a13f2710e9677fe43816607425e80feb28e3573c55c27906fc7a68eefe

      SHA512

      e6ec07cbb809bfcbb3a4b98bc58613d42e8b667f15a2a2cbabf1badf31a40e4fae2c81b2cf7278bc49e7bb16d6b7f05e8373be0b3c0aa6de748364bbacc094d1

    • C:\Users\Admin\AppData\Local\Temp\12611.exe

      Filesize

      14KB

      MD5

      90a241b997af67de416c736f04862248

      SHA1

      e42e4a9612f50dd4e29d5cb9faf6b0a56691f7cb

      SHA256

      fccfd9a13f2710e9677fe43816607425e80feb28e3573c55c27906fc7a68eefe

      SHA512

      e6ec07cbb809bfcbb3a4b98bc58613d42e8b667f15a2a2cbabf1badf31a40e4fae2c81b2cf7278bc49e7bb16d6b7f05e8373be0b3c0aa6de748364bbacc094d1

    • C:\Users\Admin\AppData\Local\Temp\cfc4c1186692634e9b8b040513b7316d717cc52bea03708e8997400bd94b613f\yqh.JPG

      Filesize

      88KB

      MD5

      8de5d13881c86110bde78f486ce110e1

      SHA1

      6ef18101e902859cb481b7fe2229bdf329e4e704

      SHA256

      8783ac5941fd594a9f34907d3353d2bbcff2585fca4d09c39df40b7c1ab0b91e

      SHA512

      0dfa09a4c7179a2a32ae5c60820f043a3895e2a4a87c3fa2f627213ddadf7093781c8db702ddbfd127f3b5072abbf33a1b03f85bf847712378af5982410308f6

    • \Users\Admin\AppData\Local\Temp\12611.exe

      Filesize

      14KB

      MD5

      90a241b997af67de416c736f04862248

      SHA1

      e42e4a9612f50dd4e29d5cb9faf6b0a56691f7cb

      SHA256

      fccfd9a13f2710e9677fe43816607425e80feb28e3573c55c27906fc7a68eefe

      SHA512

      e6ec07cbb809bfcbb3a4b98bc58613d42e8b667f15a2a2cbabf1badf31a40e4fae2c81b2cf7278bc49e7bb16d6b7f05e8373be0b3c0aa6de748364bbacc094d1

    • \Users\Admin\AppData\Local\Temp\12611.exe

      Filesize

      14KB

      MD5

      90a241b997af67de416c736f04862248

      SHA1

      e42e4a9612f50dd4e29d5cb9faf6b0a56691f7cb

      SHA256

      fccfd9a13f2710e9677fe43816607425e80feb28e3573c55c27906fc7a68eefe

      SHA512

      e6ec07cbb809bfcbb3a4b98bc58613d42e8b667f15a2a2cbabf1badf31a40e4fae2c81b2cf7278bc49e7bb16d6b7f05e8373be0b3c0aa6de748364bbacc094d1

    • memory/1176-65-0x000007FEFB5E1000-0x000007FEFB5E3000-memory.dmp

      Filesize

      8KB

    • memory/1176-66-0x0000000003750000-0x0000000003760000-memory.dmp

      Filesize

      64KB

    • memory/1324-59-0x0000000074011000-0x0000000074013000-memory.dmp

      Filesize

      8KB

    • memory/1524-54-0x0000000075B51000-0x0000000075B53000-memory.dmp

      Filesize

      8KB