Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 07:22

General

  • Target

    c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe

  • Size

    89KB

  • MD5

    e982f8207670946d5bcc18581caf6e89

  • SHA1

    003881e35f529faaa485e42d78ebd889674412cb

  • SHA256

    c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

  • SHA512

    d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

  • SSDEEP

    1536:ARFtqMnrgUfv0L6p326kF3CBg72dxNGgSuoCswHW:AflpECBk23UgSuEw2

Score
8/10

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe
    "C:\Users\Admin\AppData\Local\Temp\c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\ProgramData\512506946C42AC\512506946C42AC.exe
      C:\ProgramData\512506946C42AC\512506946C42AC.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /flushdns && ipconfig /renew
        3⤵
        • Gathers network information
        PID:1816
      • C:\Windows\SysWOW64\ctfmon.exe
        ctfmon.exe
        3⤵
          PID:1640

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\512506946C42AC\512506946C42AC.exe

            Filesize

            89KB

            MD5

            e982f8207670946d5bcc18581caf6e89

            SHA1

            003881e35f529faaa485e42d78ebd889674412cb

            SHA256

            c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

            SHA512

            d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

          • C:\ProgramData\512506946C42AC\512506946C42AC.exe

            Filesize

            89KB

            MD5

            e982f8207670946d5bcc18581caf6e89

            SHA1

            003881e35f529faaa485e42d78ebd889674412cb

            SHA256

            c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

            SHA512

            d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

          • \ProgramData\512506946C42AC\512506946C42AC.exe

            Filesize

            89KB

            MD5

            e982f8207670946d5bcc18581caf6e89

            SHA1

            003881e35f529faaa485e42d78ebd889674412cb

            SHA256

            c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

            SHA512

            d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

          • \ProgramData\512506946C42AC\512506946C42AC.exe

            Filesize

            89KB

            MD5

            e982f8207670946d5bcc18581caf6e89

            SHA1

            003881e35f529faaa485e42d78ebd889674412cb

            SHA256

            c33c1ff223a1559d988803a84fe0973c56362782ff36134398c8ffafb5efcd56

            SHA512

            d9814a9176c27e48d42258b1e615ddc94c68dbc6fc901c19e2d992b6333f2c803eda8ef8506ab997115af0b507ee5aae1ef5c52f261e02ff4df072e0b8700e3d

          • \Users\Admin\AppData\Roaming\twain.dll

            Filesize

            3KB

            MD5

            e9032dac10fb27acfa89c3357fad86b3

            SHA1

            1623843e0d369c9911989c0730a6470c22dd60fd

            SHA256

            9de0bb4cb8a79f575da4dbc86cedb6a9ef8d94c0b176fd4690b9b7ffee078391

            SHA512

            70e663ad1e87832673f7140aca20dcd3db46c256b91f2924e7a9e1ab24a295d432b625fdcc53b1f3bbc84f91390190e4bd483da5285f95ed0316be09b2b82004

          • memory/1584-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

            Filesize

            8KB

          • memory/1584-59-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/1748-62-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/1748-68-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB