Analysis

  • max time kernel
    150s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 14:05

General

  • Target

    dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499.exe

  • Size

    556KB

  • MD5

    d7af673e504b405ea7b8f7419ed52907

  • SHA1

    53f49d4474ba7719eb83d41d2d56eb50e7e633e1

  • SHA256

    dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499

  • SHA512

    868800c88bfcd01c3e90dd6989ddd10ad1ef469279cf89a7cd787967a1207588a63e8d8477e169385d976edc3c8768d3eef18e6e5a69ff879679a935e83705f7

  • SSDEEP

    12288:YGosTxSzpDq5VNYdyOshT5l4/86CaIhvPfNMIM1P27QwMMT6:YGosTxSEXzOV/UaIBNLMp20wMMT6

Score
8/10

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499.exe
    "C:\Users\Admin\AppData\Local\Temp\dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499.exe
      "C:\Users\Admin\AppData\Local\Temp\dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499.exe" /_ShowProgress
      2⤵
        PID:704

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\ICReinstall_dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499.exe

      Filesize

      556KB

      MD5

      d7af673e504b405ea7b8f7419ed52907

      SHA1

      53f49d4474ba7719eb83d41d2d56eb50e7e633e1

      SHA256

      dda977aee255c8cad3ac276a5579e16b354cf3eb4ad76106fec3e90c0fed4499

      SHA512

      868800c88bfcd01c3e90dd6989ddd10ad1ef469279cf89a7cd787967a1207588a63e8d8477e169385d976edc3c8768d3eef18e6e5a69ff879679a935e83705f7

    • memory/704-61-0x0000000000400000-0x0000000000522000-memory.dmp

      Filesize

      1.1MB

    • memory/976-54-0x0000000000400000-0x0000000000522000-memory.dmp

      Filesize

      1.1MB

    • memory/976-55-0x0000000075891000-0x0000000075893000-memory.dmp

      Filesize

      8KB

    • memory/976-56-0x0000000000400000-0x0000000000522000-memory.dmp

      Filesize

      1.1MB

    • memory/976-57-0x0000000004730000-0x0000000004852000-memory.dmp

      Filesize

      1.1MB

    • memory/976-62-0x0000000000400000-0x0000000000522000-memory.dmp

      Filesize

      1.1MB

    • memory/976-63-0x0000000004730000-0x0000000004852000-memory.dmp

      Filesize

      1.1MB

    • memory/976-65-0x0000000003D10000-0x0000000003D20000-memory.dmp

      Filesize

      64KB

    • memory/976-68-0x0000000003D10000-0x0000000003D20000-memory.dmp

      Filesize

      64KB