Analysis

  • max time kernel
    126s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 06:37

General

  • Target

    681c1a99aba58046650b4e2e323c0e389922dea8b6e977aaf848751d281c44a6.exe

  • Size

    472KB

  • MD5

    a556239106d352687659687e1832928a

  • SHA1

    af477660e54642aae12a8584be9d0c7a6dbe3de3

  • SHA256

    681c1a99aba58046650b4e2e323c0e389922dea8b6e977aaf848751d281c44a6

  • SHA512

    d1a81e56852757a0336b60bdca21dba62599e247fbcd1f83cdbf9ac9762366122b432a150ced1274a50f241c0aff072b93091ba231a64ccb576266b98016beed

  • SSDEEP

    3072:FQL8va4bjhxxp7HAM95tNez6HOB52YvpvQv5ijs3+0jJuvkca4ryF:FrdpHAM95tNez6HRxcj6u0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\681c1a99aba58046650b4e2e323c0e389922dea8b6e977aaf848751d281c44a6.exe
    "C:\Users\Admin\AppData\Local\Temp\681c1a99aba58046650b4e2e323c0e389922dea8b6e977aaf848751d281c44a6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=FUoNq1zO0BM
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1128 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:680

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7b18754ce37f6d837c04a5febfc43fdd

          SHA1

          1ea889cc2b33750da28a909fb68958175356cbed

          SHA256

          077dcd673bdd8cca1f0df1ddb20d860ae84f30c3b9fae538bf81e51968e7b60f

          SHA512

          9593a37df0dde22e1645dff89a6fa055473600c0a085f1113b6968c6e076a49d044eaf2fd071ebf25965a42d32f4245f36f5f356c37c7355817141574ee31c05

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          5KB

          MD5

          530823d6bb529cf8a6415234b474c7ac

          SHA1

          2d7bfe0b9689d8a49bcb2d624e7f654e3964d1a3

          SHA256

          629f768974887bdb99e34d8d9fce2d25bfb826248bfda944e550cd7a0f988207

          SHA512

          1b8d5e739b4ab445e611a4b443346406827195d762fdef6c16b400611a8bc00ed155ef304d1626563613cfaaab5a570d317b9f1fdf4a6df9d0041fc4f8bd330d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\44PM1TJI.txt

          Filesize

          607B

          MD5

          026f3ccdf578a885af74193501e641ba

          SHA1

          d094039b8fce681525d096c705c935075694c073

          SHA256

          9e945a9992a8174bdc6973eab9747e1eb2808cff894df810c1e8e819e91c095b

          SHA512

          bdad3ce4b9024ce537300f57143bd7e171a7a46601107c48f40cb58b9db5efb83d6e51c95ddd431a2ea6c58f7c6f218beff72dc0585175b7b6815535b1ac0f59

        • memory/1448-56-0x00000000758B1000-0x00000000758B3000-memory.dmp

          Filesize

          8KB

        • memory/1448-57-0x0000000000400000-0x0000000000476000-memory.dmp

          Filesize

          472KB