Analysis

  • max time kernel
    121s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 01:40

General

  • Target

    a246a4e7302d3fb1d2f691309294c7a73181b3afbec45a1195fc9eaa8997d8e5.exe

  • Size

    885KB

  • MD5

    0cb7e62db7dc88256abb26b8d9180bf7

  • SHA1

    d341e9a6a9b23b6dd33c7a270fc58c9f40595b42

  • SHA256

    a246a4e7302d3fb1d2f691309294c7a73181b3afbec45a1195fc9eaa8997d8e5

  • SHA512

    bd8720518f4373ae133894316fd4e4707b574d4919e569f3a04f1000b8df2472cb582aece8d7edbfe4cf554e14941065d620cc7e9b3220774a2276bec56adfa0

  • SSDEEP

    12288:xW/GVmEDX/pmbuFdM6j+JOxWlB/y50d0U3c6jSKCIlnFkAM02dGJ/8O44pXE5Y50:WB/dukn6GF/+CvDLM

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a246a4e7302d3fb1d2f691309294c7a73181b3afbec45a1195fc9eaa8997d8e5.exe
    "C:\Users\Admin\AppData\Local\Temp\a246a4e7302d3fb1d2f691309294c7a73181b3afbec45a1195fc9eaa8997d8e5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\updaterNOXvcGVCIbjZFzByEohoTtfvzCtTv.exe
      C:\Windows\updaterNOXvcGVCIbjZFzByEohoTtfvzCtTv.exe
      2⤵
        PID:1396
      • C:\Windows\updaterNOXvcGVCIbjZFzByEohoTtfvzCtTv.exe
        C:\Windows\updaterNOXvcGVCIbjZFzByEohoTtfvzCtTv.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Program Files\Internet Explorer\iexplore.exe
          /scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1892
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1716

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\02NHXYRX.txt

      Filesize

      608B

      MD5

      4fc313dc24630023ae4e7cb3ad1edcc8

      SHA1

      73d5ba90f6d58bf6cb8b8fb0324850149f1f6c2b

      SHA256

      0fc11695b53d70f96e7aed194642341e43fcb9e2bd03b93935ca662bf7604afb

      SHA512

      86770d80b941eb8b3fe28707eb4ff46adc73dc7e6ec6c2c772f938f478602f2c58ae29a9832c16a528d99f1163ee7fbd2a19147bab988f280111d4f7adc7130b

    • C:\Windows\updaterNOXvcGVCIbjZFzByEohoTtfvzCtTv.exe

      Filesize

      1.1MB

      MD5

      34aa912defa18c2c129f1e09d75c1d7e

      SHA1

      9c3046324657505a30ecd9b1fdb46c05bde7d470

      SHA256

      6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

      SHA512

      d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      171KB

      MD5

      744dcc4cbbfbb18fe3878c4e769ec48f

      SHA1

      c1f2c56ee2d91203a01d3465f185295477a1217d

      SHA256

      33eb31a2a576e663474a895ff0190316c64a93d9ce05a55df0d53f9beeb61163

      SHA512

      706630be2ca09e574a7794e32e515a0a3f993643d034647b8cb976c1e7045e87e30362757cc65fcdb95f4a4327f0dcda3edc82ba84e5ed9115870a037e13af21

    • memory/1436-64-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-69-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-59-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-58-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-63-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-55-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-75-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-56-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-71-0x0000000010000000-0x000000001005A000-memory.dmp

      Filesize

      360KB

    • memory/1436-74-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1436-73-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1756-72-0x00000000742C0000-0x000000007486B000-memory.dmp

      Filesize

      5.7MB

    • memory/1756-65-0x00000000742C0000-0x000000007486B000-memory.dmp

      Filesize

      5.7MB

    • memory/1756-54-0x0000000075141000-0x0000000075143000-memory.dmp

      Filesize

      8KB