Analysis

  • max time kernel
    136s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 18:52

General

  • Target

    cf8dff80d692e2d33fdf276b00af9a045ae539e6ef5cd261c4a2110ef4449fb4.exe

  • Size

    276KB

  • MD5

    33de1e62a5ef11f3a07b1eaff838d0b1

  • SHA1

    edcf67191b624a65e3b87dc9484a983956d52fc3

  • SHA256

    cf8dff80d692e2d33fdf276b00af9a045ae539e6ef5cd261c4a2110ef4449fb4

  • SHA512

    04f8afcbac2f4e13d839670c906d690f18bc1f2699482ebe3aaa94cf079ded730e97982ddbfce5ab062c67af55cceaad12295feffcedce98c7022044efad310b

  • SSDEEP

    3072:zjmviq+iLSknHhUcBZTY/RgU4y7IQh4QLbEY/N+iLSknHhUcBZwiW:v7CBNsg1y7IQh4uov7CB

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf8dff80d692e2d33fdf276b00af9a045ae539e6ef5cd261c4a2110ef4449fb4.exe
    "C:\Users\Admin\AppData\Local\Temp\cf8dff80d692e2d33fdf276b00af9a045ae539e6ef5cd261c4a2110ef4449fb4.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.eluniversal.com.mx/notas/504568.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:580

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7b61e900bf04f2c121b86b2fdd54fc84

          SHA1

          7a8ddbb5351b2cc74e2dc8f8d903f2ceb7afd6d4

          SHA256

          906fe2014501f2a69516b1517d45855879cdb10bd72b3ad98e845dff9e6ffa75

          SHA512

          a533bad084058ed960ba080e9166c7bb8c495ccf698b97476b35eaf79bbc01d1f25c846f9e4ff1896cfbb2ec1ddae7f3be4cc1ec57d56a1de3fc654d00a21cc7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          763f121873ba08b8de6220bfbedfef56

          SHA1

          d194a373c16b74d479c41f04d5492941771f6aa4

          SHA256

          91f82552a932e82c3af5a4383f49192dd8e58bf036b16054afa871c022011d5d

          SHA512

          a2b9dc41836b08523cd4efa2e53e9c71ffd4081b4a73695286aabdfb6f353ca28647f1fd04caef11924276639335b963d0a9998dd0271873b3fc96499e23bf45

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4NZ9EVPW.txt

          Filesize

          603B

          MD5

          1cc2e4911e2514e3be0fc3fa6987d0be

          SHA1

          e4749716189c2a4c570c5e50c9b4a013b6037057

          SHA256

          0f28f2b6fc35d8dc9b0490f50a90f644912a6670b0ae09ebef585728a5899b5a

          SHA512

          a52380638e5b4e0efe2192aadbca695fec29adf1151d8dbccdf2c9bc3d37c74b9a2392c149e6aec8109f65a29fa2e0f71d3aad9837ea83f674a4922cca891102

        • memory/1000-56-0x0000000075201000-0x0000000075203000-memory.dmp

          Filesize

          8KB

        • memory/1000-57-0x0000000003C01000-0x0000000004AAD000-memory.dmp

          Filesize

          14.7MB