Analysis

  • max time kernel
    107s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 17:32

General

  • Target

    b6e7b484c72a15893bb035cee43a5cb6441ef3ac57127b0c02face1ab47ce26f.exe

  • Size

    668KB

  • MD5

    a1bc7efbaf6fd677a1f209a53b0ad366

  • SHA1

    5b55b383d4760d41297f56093eef83436f1f3002

  • SHA256

    b6e7b484c72a15893bb035cee43a5cb6441ef3ac57127b0c02face1ab47ce26f

  • SHA512

    7bad767024ec1afa81be52b855cbb07cfa3ddeb8b36fee3c66e90c888141ee8819cb6db09e68b9eec5c60538ea915685d5b4eb9222d932a8c689a9f309f39598

  • SSDEEP

    12288:6RUvG0qsFtqcXMJkQwyke38/jZQZEF5mmMkYpiW5ZX+PLB:6RUYzRJvdktjGZE7+kYpie6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6e7b484c72a15893bb035cee43a5cb6441ef3ac57127b0c02face1ab47ce26f.exe
    "C:\Users\Admin\AppData\Local\Temp\b6e7b484c72a15893bb035cee43a5cb6441ef3ac57127b0c02face1ab47ce26f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.snyxz.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1344

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NF6N078I.txt

          Filesize

          608B

          MD5

          e62fa9f1faa8611062e598249f3bae42

          SHA1

          6f6b2f0a1b1cecc58f9790ce140f44f56d06dc6d

          SHA256

          34f2e175dc2079a9da55022dc288b7534ec11dfe397caea32dbf25eced732a5f

          SHA512

          8dae05482a7812fa47d3f9d113a601133e44684aebb685fd0a477c5f31ce80a6a2f35da17688092b74089b14867b1849a8c413d7030c111600c9ce6677e76fa7

        • memory/1768-54-0x0000000076961000-0x0000000076963000-memory.dmp

          Filesize

          8KB