Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 14:35

General

  • Target

    daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe

  • Size

    304KB

  • MD5

    f1e2d367c882743bebe8ded342cc96ef

  • SHA1

    fc539c9ae3c551016972c076ac7e383eba19d39c

  • SHA256

    daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562

  • SHA512

    a4b79212d2cac5ba77d1ed9399f19cd34cca702d4397430cdb26589ebe11fdaf1e82cb033849ba12103d6a806f6283d1037d1e98db649d122c2dc4748e02a889

  • SSDEEP

    3072:AfUCvhQ/LMe3gBk3Ol9x4CuSqhAp08FkGRnNrdf45AjqKnoeaw:aUm6QeQHlvKhAp081nNVjqKoe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe
    "C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe
      "C:\Users\Admin\AppData\Local\Temp\daeef846c015cf82c40415ae410935cdb6f0f3e8f79aaa6d7ed8783a10614562.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\YGUTF.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "atiradeonx86.bat" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\atiradeonx86.bat" /f
          4⤵
          • Adds Run key to start application
          PID:460
      • C:\Users\Admin\AppData\Roaming\atiradeonx86.bat
        "C:\Users\Admin\AppData\Roaming\atiradeonx86.bat"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:288
        • C:\Users\Admin\AppData\Roaming\atiradeonx86.bat
          "C:\Users\Admin\AppData\Roaming\atiradeonx86.bat"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1960
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:344
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:344 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:992

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\YGUTF.bat

          Filesize

          150B

          MD5

          7d2115acc388532cf3bee4380f172915

          SHA1

          31143e9730264b58c847e7c8c166fd8f8acf61cc

          SHA256

          fd6b7074ca8c462738ac51f70a0f5fde9638806230e06b6a609da201c84f9da1

          SHA512

          f135928e06b803fd8f96fa52366c8ab4dbe70803c9c6e2ac2bf93f61f0302e9eeaa1b1774916b106e6b2247e2088ed5ccbad029c3a48e52e39e9cd73413bff9a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WOHRV25A.txt

          Filesize

          608B

          MD5

          e814aa10ad9bbbb9bb67d4871ef70015

          SHA1

          21dd17c92c478fc7ffc0b3cee1ec62f35d545ebe

          SHA256

          cf008ad2379030e701042151245a0b877dcfc031ba3ae0075a8dc22eee063fe3

          SHA512

          ab7620278661606ef1f03b216647dd1d7e716b9ff41556c40e4c4ca42775ebf32c7e776d3f61a0f2418cb89025e13ee4ab72df514e93ae8714162bd418673dc4

        • C:\Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • C:\Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • C:\Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • \Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • \Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • \Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • \Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • \Users\Admin\AppData\Roaming\atiradeonx86.bat

          Filesize

          304KB

          MD5

          88b9dccec7f821d1e53e4d60f96755c2

          SHA1

          27cbab71d2f0efa4b6e234e842a7f3dbe393a593

          SHA256

          75b933076ef46f272050020132b3f106f07285c3adea99a0f779c1068b50a3eb

          SHA512

          3634cb8b87bd60dfc202951da5e23d63ffb2e41ea77a90c02cfbafbbed6572aa4ebd461bbfa9ddc4b2b8abb2ad7a8c86a12b6ef93e4c936919af99fd9f3da823

        • memory/288-111-0x0000000000570000-0x0000000000572000-memory.dmp

          Filesize

          8KB

        • memory/288-114-0x00000000003D0000-0x00000000003D2000-memory.dmp

          Filesize

          8KB

        • memory/288-117-0x0000000000570000-0x0000000000572000-memory.dmp

          Filesize

          8KB

        • memory/288-115-0x00000000003F0000-0x00000000003F2000-memory.dmp

          Filesize

          8KB

        • memory/288-116-0x0000000000530000-0x0000000000532000-memory.dmp

          Filesize

          8KB

        • memory/288-113-0x00000000003C0000-0x00000000003C2000-memory.dmp

          Filesize

          8KB

        • memory/288-109-0x00000000003F0000-0x00000000003F2000-memory.dmp

          Filesize

          8KB

        • memory/288-110-0x0000000000530000-0x0000000000532000-memory.dmp

          Filesize

          8KB

        • memory/288-107-0x00000000005D2000-0x00000000005DF000-memory.dmp

          Filesize

          52KB

        • memory/288-108-0x00000000005D2000-0x00000000005DF000-memory.dmp

          Filesize

          52KB

        • memory/288-103-0x00000000003C0000-0x00000000003C2000-memory.dmp

          Filesize

          8KB

        • memory/596-82-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-128-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-75-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-112-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-76-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-78-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-86-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-79-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/596-83-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1204-66-0x0000000002390000-0x0000000002392000-memory.dmp

          Filesize

          8KB

        • memory/1204-71-0x0000000002380000-0x0000000002382000-memory.dmp

          Filesize

          8KB

        • memory/1204-64-0x0000000000320000-0x0000000000327000-memory.dmp

          Filesize

          28KB

        • memory/1204-65-0x0000000002380000-0x0000000002382000-memory.dmp

          Filesize

          8KB

        • memory/1204-67-0x0000000002730000-0x0000000002732000-memory.dmp

          Filesize

          8KB

        • memory/1204-68-0x0000000000550000-0x0000000000552000-memory.dmp

          Filesize

          8KB

        • memory/1204-58-0x0000000000550000-0x0000000000552000-memory.dmp

          Filesize

          8KB

        • memory/1204-69-0x0000000000560000-0x0000000000562000-memory.dmp

          Filesize

          8KB

        • memory/1204-70-0x0000000002370000-0x0000000002372000-memory.dmp

          Filesize

          8KB

        • memory/1204-63-0x0000000000320000-0x0000000000327000-memory.dmp

          Filesize

          28KB

        • memory/1204-74-0x00000000023D0000-0x00000000023D2000-memory.dmp

          Filesize

          8KB

        • memory/1204-73-0x00000000023C0000-0x00000000023C2000-memory.dmp

          Filesize

          8KB

        • memory/1204-72-0x0000000002390000-0x0000000002392000-memory.dmp

          Filesize

          8KB

        • memory/1204-59-0x0000000000560000-0x0000000000562000-memory.dmp

          Filesize

          8KB

        • memory/1204-62-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

          Filesize

          8KB

        • memory/1960-131-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1960-133-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB