Analysis

  • max time kernel
    124s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 07:42

General

  • Target

    96d1684abc120d9eee9a4f93bfa9513c98113c879000eca8614851afcadbbf70.exe

  • Size

    536KB

  • MD5

    a11027cc67801ea5c8bc8e87405f66a7

  • SHA1

    68bb583b80b2798533f6af4c673a095db221fdc9

  • SHA256

    96d1684abc120d9eee9a4f93bfa9513c98113c879000eca8614851afcadbbf70

  • SHA512

    9c1ddeafaa9d9ecbbe6fceecddd0b681f9e7079e15dc238677a98fcb5e7a692e01b1b3457c99ce4f7ea2f7c2084ab3e6b75e088454bc963d6f37dab9e49b548a

  • SSDEEP

    6144:L0xWAiRvFr84JQc7zLII6SDzAWziUwlx9hg74MZ5MoDIHQdqk3gJTTlh4GVzXg:LQ5iPi8

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96d1684abc120d9eee9a4f93bfa9513c98113c879000eca8614851afcadbbf70.exe
    "C:\Users\Admin\AppData\Local\Temp\96d1684abc120d9eee9a4f93bfa9513c98113c879000eca8614851afcadbbf70.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=gOO_UqzEc5Y
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3707591520da296915ae3bfbf43e5d89

    SHA1

    9c41c94a20027ebfffdfabe19c8a4ab4fb09f5eb

    SHA256

    8899393ede02d538eaf74c4fa877975171e936ae4a79c9220cf8e065e1f6c80c

    SHA512

    e733ab416aa3cc9b7c2ee7b231c75a75e033ed7857eba4a8fb744663107bc726f42d251ed6a3e86147abe76a462fdb2d8921052fe3289c0c90aa71657e1e661f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    2babeb8d6b87ad960e51ccdaf0d797dc

    SHA1

    9727c32d54c6598ee063d82ba619effa96eac647

    SHA256

    97024c933ff5dbc312b94f9129ed227ae40e685bdf531bc8cb256665412c00af

    SHA512

    348c7d40292fe29875dec578a5355344c6ae5dc33a400f7f0bb4aad4c5377512f8487fa77f54b46ac2d454d26d6284cc248f5d8e6b55fc0a8103bc23c801e80f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S1HBPEPF.txt

    Filesize

    608B

    MD5

    178550fa9b4e63ce923f3e1e1abaa647

    SHA1

    601dfc0541dff0d29fd68fb6ba4ad5983c0ee011

    SHA256

    5ccb8be91a46ed30d5498466c3c923f4d5944cd24b1dec5dab5b52bc0fa687db

    SHA512

    c500617663932f9bcdc820703f11f18d4b5601ef89912c0626153046c7518149fe61cf8dce5b3b70eabbee4aa8faafd75fb61da30e8cbe06539cadb8ff70984e

  • memory/2016-56-0x0000000075A71000-0x0000000075A73000-memory.dmp

    Filesize

    8KB

  • memory/2016-57-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-59-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB