Analysis

  • max time kernel
    85s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 18:50

General

  • Target

    e1c66a82c640050fc356360da5bc6258f88341c031c725fa9e09f7f5793f2391.exe

  • Size

    232KB

  • MD5

    4e51bfc7f1f1a362a9c0bdb9655b0643

  • SHA1

    892ff151ecd6617cbb9d4b9f9edbf94bd4093722

  • SHA256

    e1c66a82c640050fc356360da5bc6258f88341c031c725fa9e09f7f5793f2391

  • SHA512

    61ee2347647b2d7602e40ec858edc1e9a24cdedf9de8d8e3136d193f174135579051ff41b3e0157e6fcf85d59ace0715f74629e820de36e7e90a50a97555943e

  • SSDEEP

    3072:HJgkavfMkDGC+8ZMfaKiY/OfgpOsYmXdJCD1uR8mVGPghD+lTm:HJIfYCbZMyIOgJYmR8mVGP9A

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1c66a82c640050fc356360da5bc6258f88341c031c725fa9e09f7f5793f2391.exe
    "C:\Users\Admin\AppData\Local\Temp\e1c66a82c640050fc356360da5bc6258f88341c031c725fa9e09f7f5793f2391.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" c:\temporary\stcterms.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4588

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\temporary\stcterms.html

          Filesize

          146B

          MD5

          8eec510e57f5f732fd2cce73df7b73ef

          SHA1

          3c0af39ecb3753c5fee3b53d063c7286019eac3b

          SHA256

          55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0

          SHA512

          73bbf698482132b5fd60a0b58926fddec9055f8095a53bc52714e211e9340c3419736ceafd6b279667810114d306bfccdcfcddf51c0b67fe9e3c73c54583e574

        • memory/1860-132-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/1860-133-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB