Analysis

  • max time kernel
    110s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 23:39

General

  • Target

    9d5dfb3802dbd1b278fbaa2ac64f1c14fe3e5f2bda093fa7690fb0fb7f4ae7d0.exe

  • Size

    681KB

  • MD5

    3a29fd494265a450257366cb825b4a34

  • SHA1

    e79cc959f455f9001ae195fc1bef1fd35b22528f

  • SHA256

    9d5dfb3802dbd1b278fbaa2ac64f1c14fe3e5f2bda093fa7690fb0fb7f4ae7d0

  • SHA512

    e04961e274fd780437dfe19432c2a300a6664955e279cbd04259f0b6fb14a9fd0c098219cba51c39060a4b6ebddb94fec9b75549ae5ed4d9e44187d63178f135

  • SSDEEP

    12288:iFszBhqS5m3fwQH0TQrHE13+WMa4Ub7yPauh+HclAkd2xdWK8EmdLmU//yAvbeOM:iFszWS5ooeUQS+xa7VZ8v2a5Emlt//po

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d5dfb3802dbd1b278fbaa2ac64f1c14fe3e5f2bda093fa7690fb0fb7f4ae7d0.exe
    "C:\Users\Admin\AppData\Local\Temp\9d5dfb3802dbd1b278fbaa2ac64f1c14fe3e5f2bda093fa7690fb0fb7f4ae7d0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Xvcpcsexpre_setup.exe
      "C:\Xvcpcsexpre_setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Program Files (x86)\Xvcpcsexpre.exe
        "C:\Program Files (x86)\Xvcpcsexpre.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies Internet Explorer Automatic Crash Recovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1964
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:1916
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1476
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 10 &del "C:\Xvcpcsexpre_setup.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 10
          4⤵
          • Runs ping.exe
          PID:604
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 10 &del "C:\C:\krnln.fnr"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 10
          4⤵
          • Runs ping.exe
          PID:328
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 10 &del "C:\C:\Exmlrpc.fne"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 10
          4⤵
          • Runs ping.exe
          PID:1644
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 10 &del "C:\C:\dp1.fne"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 10
          4⤵
          • Runs ping.exe
          PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Exmlrpc.fne

    Filesize

    92KB

    MD5

    2c9211cd380016db2f943ac96e6c8915

    SHA1

    95c75052feab202eaa402ca520bf968c9438f6c3

    SHA256

    3fbbb93599c220dbf6b37138f01eb64de6412e462be520eae1cf173b7d211338

    SHA512

    4aa15dbfe86a6f26a6e74959258322528e32eb32ff010f2fdaa75c5b138be40c34456ab9527ede8fe3b8adfacf7a2d8c1a690cb1095ab935ad1a61ff3be41992

  • C:\Program Files (x86)\Xvcpcsexpre.exe

    Filesize

    9.4MB

    MD5

    24772aa16a70dde0f75f724ded530a51

    SHA1

    3fd289d0ba2dd511c49f9c3818d4ed3e8ba93611

    SHA256

    00551e11843c57749d55c39862a149e2f92da59eb0bc7c92e51ddf724373002c

    SHA512

    b8193809dd7470d5b10e0c42660003bacbcbc528837159055f35108ad5370c822ca85737b5b1d24c98b4383afac84a6f5f214441e0c6175a41f74558fad5f98f

  • C:\Program Files (x86)\Xvcpcsexpre.exe

    Filesize

    9.4MB

    MD5

    24772aa16a70dde0f75f724ded530a51

    SHA1

    3fd289d0ba2dd511c49f9c3818d4ed3e8ba93611

    SHA256

    00551e11843c57749d55c39862a149e2f92da59eb0bc7c92e51ddf724373002c

    SHA512

    b8193809dd7470d5b10e0c42660003bacbcbc528837159055f35108ad5370c822ca85737b5b1d24c98b4383afac84a6f5f214441e0c6175a41f74558fad5f98f

  • C:\Program Files (x86)\dp1.fne

    Filesize

    128KB

    MD5

    07201b1fd5f8925dd49a4556ac3b5bab

    SHA1

    a76afbb44376912f823f2b461507c28d2585a96c

    SHA256

    abebbb0981d3d51eb63abcfa68be98da0cae4e6e3b143dd431fc845d1457dbd2

    SHA512

    0cf673ce1b6cad38f0211231e876f00f6a8397a5f3e71680046f4a216bbe0f47f4541e5f5b49364310e41a04cce14703459725c3d9f052f9da13624e73753e12

  • C:\Program Files (x86)\krnln.fnr

    Filesize

    1.0MB

    MD5

    44e2ca67c060fbe3dc0d030149f5a478

    SHA1

    5df61eb626bc3849893701942114609c1086d496

    SHA256

    6ced19283dbbb95f264448f380592f4e98ba8228efca2f68821ab3ae61029d93

    SHA512

    1a348c7585d78dd68c1d0e059ea1d7cea57c1aeff734f834f75025719b9fdd0e9bb16aebe75e15502a1b83106387eaa9493b8990999e0a68b62c1afdbc8cf45e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9VCL77UY.txt

    Filesize

    608B

    MD5

    785836eabca47781bcd4883e6f2ef3c4

    SHA1

    3193eef489f86b28fb60e0a579a55aaa52fa1b24

    SHA256

    2992bbbf602da87b731fe2ec5e3cd7defc02dd42aaacc9cb192438101bce0778

    SHA512

    65b78c0b8b3351b5c681440dc662e22efd699a034b5d2ad6ffdf461ed7447e4d4f5972c9744ad0ab69f011f6c2c06d38a57cfa489827a9bceea4740e58dee152

  • C:\Xvcpcsexpre_setup.exe

    Filesize

    9.4MB

    MD5

    36815e86ac4bfff3697423549876ab14

    SHA1

    9d30e2315a8c2e1febca5be6865b8a170fe9e70f

    SHA256

    8f4dd09c92c8d37d1a40fbdc704e7d8da24a7c801a1e3092a8bd3af3469cee88

    SHA512

    7ebace52b1ff64971cd8becdc50ef9082e3da93abacbc2a1ed413a655aa0da5cb1404a50781b072c1a76b56239ef36a3e901621166206735e7354380987ab6ec

  • C:\Xvcpcsexpre_setup.exe

    Filesize

    9.4MB

    MD5

    36815e86ac4bfff3697423549876ab14

    SHA1

    9d30e2315a8c2e1febca5be6865b8a170fe9e70f

    SHA256

    8f4dd09c92c8d37d1a40fbdc704e7d8da24a7c801a1e3092a8bd3af3469cee88

    SHA512

    7ebace52b1ff64971cd8becdc50ef9082e3da93abacbc2a1ed413a655aa0da5cb1404a50781b072c1a76b56239ef36a3e901621166206735e7354380987ab6ec

  • C:\dp1.fne

    Filesize

    128KB

    MD5

    07201b1fd5f8925dd49a4556ac3b5bab

    SHA1

    a76afbb44376912f823f2b461507c28d2585a96c

    SHA256

    abebbb0981d3d51eb63abcfa68be98da0cae4e6e3b143dd431fc845d1457dbd2

    SHA512

    0cf673ce1b6cad38f0211231e876f00f6a8397a5f3e71680046f4a216bbe0f47f4541e5f5b49364310e41a04cce14703459725c3d9f052f9da13624e73753e12

  • C:\krnln.fnr

    Filesize

    1.0MB

    MD5

    44e2ca67c060fbe3dc0d030149f5a478

    SHA1

    5df61eb626bc3849893701942114609c1086d496

    SHA256

    6ced19283dbbb95f264448f380592f4e98ba8228efca2f68821ab3ae61029d93

    SHA512

    1a348c7585d78dd68c1d0e059ea1d7cea57c1aeff734f834f75025719b9fdd0e9bb16aebe75e15502a1b83106387eaa9493b8990999e0a68b62c1afdbc8cf45e

  • \Program Files (x86)\Xvcpcsexpre.exe

    Filesize

    9.4MB

    MD5

    24772aa16a70dde0f75f724ded530a51

    SHA1

    3fd289d0ba2dd511c49f9c3818d4ed3e8ba93611

    SHA256

    00551e11843c57749d55c39862a149e2f92da59eb0bc7c92e51ddf724373002c

    SHA512

    b8193809dd7470d5b10e0c42660003bacbcbc528837159055f35108ad5370c822ca85737b5b1d24c98b4383afac84a6f5f214441e0c6175a41f74558fad5f98f

  • \Program Files (x86)\Xvcpcsexpre.exe

    Filesize

    9.4MB

    MD5

    24772aa16a70dde0f75f724ded530a51

    SHA1

    3fd289d0ba2dd511c49f9c3818d4ed3e8ba93611

    SHA256

    00551e11843c57749d55c39862a149e2f92da59eb0bc7c92e51ddf724373002c

    SHA512

    b8193809dd7470d5b10e0c42660003bacbcbc528837159055f35108ad5370c822ca85737b5b1d24c98b4383afac84a6f5f214441e0c6175a41f74558fad5f98f

  • \Program Files (x86)\Xvcpcsexpre.exe

    Filesize

    9.4MB

    MD5

    24772aa16a70dde0f75f724ded530a51

    SHA1

    3fd289d0ba2dd511c49f9c3818d4ed3e8ba93611

    SHA256

    00551e11843c57749d55c39862a149e2f92da59eb0bc7c92e51ddf724373002c

    SHA512

    b8193809dd7470d5b10e0c42660003bacbcbc528837159055f35108ad5370c822ca85737b5b1d24c98b4383afac84a6f5f214441e0c6175a41f74558fad5f98f

  • \Program Files (x86)\Xvcpcsexpre.exe

    Filesize

    9.4MB

    MD5

    24772aa16a70dde0f75f724ded530a51

    SHA1

    3fd289d0ba2dd511c49f9c3818d4ed3e8ba93611

    SHA256

    00551e11843c57749d55c39862a149e2f92da59eb0bc7c92e51ddf724373002c

    SHA512

    b8193809dd7470d5b10e0c42660003bacbcbc528837159055f35108ad5370c822ca85737b5b1d24c98b4383afac84a6f5f214441e0c6175a41f74558fad5f98f

  • \Program Files (x86)\Xvcpcsexpre.exe

    Filesize

    9.4MB

    MD5

    24772aa16a70dde0f75f724ded530a51

    SHA1

    3fd289d0ba2dd511c49f9c3818d4ed3e8ba93611

    SHA256

    00551e11843c57749d55c39862a149e2f92da59eb0bc7c92e51ddf724373002c

    SHA512

    b8193809dd7470d5b10e0c42660003bacbcbc528837159055f35108ad5370c822ca85737b5b1d24c98b4383afac84a6f5f214441e0c6175a41f74558fad5f98f

  • \Program Files (x86)\dp1.fne

    Filesize

    128KB

    MD5

    07201b1fd5f8925dd49a4556ac3b5bab

    SHA1

    a76afbb44376912f823f2b461507c28d2585a96c

    SHA256

    abebbb0981d3d51eb63abcfa68be98da0cae4e6e3b143dd431fc845d1457dbd2

    SHA512

    0cf673ce1b6cad38f0211231e876f00f6a8397a5f3e71680046f4a216bbe0f47f4541e5f5b49364310e41a04cce14703459725c3d9f052f9da13624e73753e12

  • \Program Files (x86)\krnln.fnr

    Filesize

    1.0MB

    MD5

    44e2ca67c060fbe3dc0d030149f5a478

    SHA1

    5df61eb626bc3849893701942114609c1086d496

    SHA256

    6ced19283dbbb95f264448f380592f4e98ba8228efca2f68821ab3ae61029d93

    SHA512

    1a348c7585d78dd68c1d0e059ea1d7cea57c1aeff734f834f75025719b9fdd0e9bb16aebe75e15502a1b83106387eaa9493b8990999e0a68b62c1afdbc8cf45e

  • memory/328-96-0x0000000000000000-mapping.dmp

  • memory/520-87-0x0000000000000000-mapping.dmp

  • memory/604-95-0x0000000000000000-mapping.dmp

  • memory/896-89-0x0000000000000000-mapping.dmp

  • memory/1044-88-0x0000000000000000-mapping.dmp

  • memory/1536-99-0x0000000000000000-mapping.dmp

  • memory/1612-54-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB

  • memory/1644-98-0x0000000000000000-mapping.dmp

  • memory/1724-86-0x0000000000000000-mapping.dmp

  • memory/1900-79-0x00000000032A0000-0x0000000003C09000-memory.dmp

    Filesize

    9.4MB

  • memory/1900-62-0x00000000014A0000-0x0000000001E09000-memory.dmp

    Filesize

    9.4MB

  • memory/1900-55-0x0000000000000000-mapping.dmp

  • memory/1900-66-0x0000000000DE0000-0x0000000000E0E000-memory.dmp

    Filesize

    184KB

  • memory/1900-63-0x00000000014A0000-0x0000000001E09000-memory.dmp

    Filesize

    9.4MB

  • memory/1900-60-0x00000000014A0000-0x0000000001E09000-memory.dmp

    Filesize

    9.4MB

  • memory/1900-91-0x0000000000400000-0x0000000000D69000-memory.dmp

    Filesize

    9.4MB

  • memory/1900-72-0x00000000032A0000-0x0000000003C09000-memory.dmp

    Filesize

    9.4MB

  • memory/1900-61-0x0000000000400000-0x0000000000D69000-memory.dmp

    Filesize

    9.4MB

  • memory/1964-69-0x0000000000000000-mapping.dmp

  • memory/1964-80-0x0000000000400000-0x0000000000D69000-memory.dmp

    Filesize

    9.4MB

  • memory/1964-83-0x0000000000E70000-0x0000000000E9E000-memory.dmp

    Filesize

    184KB

  • memory/1964-85-0x00000000013F0000-0x0000000001D59000-memory.dmp

    Filesize

    9.4MB

  • memory/1964-102-0x00000000013F0000-0x0000000001D59000-memory.dmp

    Filesize

    9.4MB

  • memory/1964-104-0x0000000000400000-0x0000000000D69000-memory.dmp

    Filesize

    9.4MB

  • memory/1964-84-0x00000000013F0000-0x0000000001D59000-memory.dmp

    Filesize

    9.4MB