Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 23:04

General

  • Target

    853827520a9f90eb050e0dcb2f2a0f2c8ddc61508c4a7adc6316ef6a9ff3515c.exe

  • Size

    706KB

  • MD5

    6dbf22845f9b2867c61cef220aa209a6

  • SHA1

    fe52da591ed84ec0bb57319c80326c11a6cd4173

  • SHA256

    853827520a9f90eb050e0dcb2f2a0f2c8ddc61508c4a7adc6316ef6a9ff3515c

  • SHA512

    f2a336dc377ce91e354712e9fd7534c1f4dfea0d9fdfa127d0d5704e79bf6557f996cf5a9e5644020e13c01459a3ac7dde210aa6f9a3cf3f75e46b2e4ff58b4f

  • SSDEEP

    12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGspmWKDXJtYsTi17a:gpQ/6trYlvYPK+lqD73TeGspmptNTik

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\853827520a9f90eb050e0dcb2f2a0f2c8ddc61508c4a7adc6316ef6a9ff3515c.exe
    "C:\Users\Admin\AppData\Local\Temp\853827520a9f90eb050e0dcb2f2a0f2c8ddc61508c4a7adc6316ef6a9ff3515c.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\ScrBlaze.scr
      "C:\Windows\ScrBlaze.scr" /S
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:772
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x570
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1112
  • C:\Windows\ScrBlaze.scr
    C:\Windows\ScrBlaze.scr /s
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:1944

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\58OXC2EF.txt

          Filesize

          74B

          MD5

          ededbc8dda025db7d4ec213e27230cc8

          SHA1

          c3eb68c0ca9ef67e349815bdff5f03293416a438

          SHA256

          08b10f3ce7fee5437869851e3dd334bc555b9415b71e5904660f04387507d3b8

          SHA512

          b3a4ad727fe41f827712699ac168690c99c34644355987387324454d635253b4406aba71e133ef7ab14c801b56ba4ee3ab0334aba00a59af8fa353030c304f0a

        • C:\Windows\ScrBlaze.scr

          Filesize

          706KB

          MD5

          6dbf22845f9b2867c61cef220aa209a6

          SHA1

          fe52da591ed84ec0bb57319c80326c11a6cd4173

          SHA256

          853827520a9f90eb050e0dcb2f2a0f2c8ddc61508c4a7adc6316ef6a9ff3515c

          SHA512

          f2a336dc377ce91e354712e9fd7534c1f4dfea0d9fdfa127d0d5704e79bf6557f996cf5a9e5644020e13c01459a3ac7dde210aa6f9a3cf3f75e46b2e4ff58b4f

        • C:\Windows\ScrBlaze.scr

          Filesize

          706KB

          MD5

          6dbf22845f9b2867c61cef220aa209a6

          SHA1

          fe52da591ed84ec0bb57319c80326c11a6cd4173

          SHA256

          853827520a9f90eb050e0dcb2f2a0f2c8ddc61508c4a7adc6316ef6a9ff3515c

          SHA512

          f2a336dc377ce91e354712e9fd7534c1f4dfea0d9fdfa127d0d5704e79bf6557f996cf5a9e5644020e13c01459a3ac7dde210aa6f9a3cf3f75e46b2e4ff58b4f

        • C:\Windows\ScrBlaze.scr

          Filesize

          706KB

          MD5

          6dbf22845f9b2867c61cef220aa209a6

          SHA1

          fe52da591ed84ec0bb57319c80326c11a6cd4173

          SHA256

          853827520a9f90eb050e0dcb2f2a0f2c8ddc61508c4a7adc6316ef6a9ff3515c

          SHA512

          f2a336dc377ce91e354712e9fd7534c1f4dfea0d9fdfa127d0d5704e79bf6557f996cf5a9e5644020e13c01459a3ac7dde210aa6f9a3cf3f75e46b2e4ff58b4f

        • C:\Windows\s18273659

          Filesize

          906B

          MD5

          6a923b00457ec0b7fed99bedc5b7803c

          SHA1

          02a0d4b9d3d76fa53e7e9049abc21e909c3b355c

          SHA256

          c0cf92ffaa10ef62597443877cc90f320b0b7c8a8906e2535469409f60f65d64

          SHA512

          df5d5a828e19ca90c852afd5757bb362f609790604c7168bd9f1086382a9dd5f9d56339bf2b5a1aa335ff7d167552fa0eb7f607d986282864839121f77526b65

        • C:\Windows\s18273659

          Filesize

          926B

          MD5

          bff91ea9a6cee71083f6ba044131ec4c

          SHA1

          6d8860cfaf1014a973bf0839b2ba084ded6de2e4

          SHA256

          476433d1459a90659fa9113152a95ef229a4d8f52056a39403b32dbdd79292d7

          SHA512

          fb5e6fbb1aad620a916317dff25712e32fc92af55c1f48012a8f8c1cdf8aa68de9d4f6edc8ba6fb9d5142a24c9289c209bbb0b96362db3f3b64373438fd87401

        • memory/1444-54-0x0000000075D71000-0x0000000075D73000-memory.dmp

          Filesize

          8KB