Analysis

  • max time kernel
    164s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 08:20

General

  • Target

    b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681.exe

  • Size

    65KB

  • MD5

    fc3aa77df7e6002743a7ed4abf4093fe

  • SHA1

    4a57658915176db558e2952d2ba142e4cc234ff1

  • SHA256

    b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681

  • SHA512

    eaf95a0a4e38a3ab28f35a22d890829a967811d75da7340321666dce74a0e5f520e97403bb2b74312aaf7720b945ff6a7e63cafeb37fd733bffbb44cb05040e5

  • SSDEEP

    768:ZmpM8yr+1afhsF5jPoJHOP97Fe/k2h3YZUTrWk93n/OGVUunkoqoR0yEa+gPXSSv:ZaIOkqoFs9Zud/O59a3PX7uQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681.exe
      "C:\Users\Admin\AppData\Local\Temp\b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" http://browseusers.myspace.com/Browse/Browse.aspx
        3⤵
          PID:556
        • C:\Windows\msnsmgrs.exe
          "C:\Windows\msnsmgrs.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1920
          • C:\Windows\msnsmgrs.exe
            "C:\Windows\msnsmgrs.exe"
            4⤵
            • Executes dropped EXE
            PID:384
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://browseusers.myspace.com/Browse/Browse.aspx
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1620

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      49957d88d4c423eb87b767c664dcde17

      SHA1

      0c89b8de062132ec690a14f1f8e203782f5a3147

      SHA256

      9681e961c9b81dde2346505e5616a75267bc76b88dbbcf9ac690ea29731f1dd5

      SHA512

      b858f6dd634b4f9b3cc678f98bd32fbc69c9d5afd2cdf72e5d3660b932cf1f8293560b5b13f803a2dd144895b5fc1a5f94256f0ffcc0f0e83a95f8aef5bef2a0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W5QF2U1M.txt

      Filesize

      601B

      MD5

      f187ab5dd19d17e662eab7a7182fac45

      SHA1

      b9e6fe4e4ef37d95baa3e492fbe2356f5ae975e7

      SHA256

      7af605eaf31ef3ab3b3cc10cd620df8bdeafb371aee3399caddbb538aa0930ec

      SHA512

      9acb7ad73cc08342cea78d80abba3442d258175652bffce015967d0b4a1d990f5e7bb127a7d414f451e2e66ab5b2967c2c561217b7180d275f3a2b03efdf3e9e

    • C:\Windows\msnsmgrs.exe

      Filesize

      65KB

      MD5

      fc3aa77df7e6002743a7ed4abf4093fe

      SHA1

      4a57658915176db558e2952d2ba142e4cc234ff1

      SHA256

      b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681

      SHA512

      eaf95a0a4e38a3ab28f35a22d890829a967811d75da7340321666dce74a0e5f520e97403bb2b74312aaf7720b945ff6a7e63cafeb37fd733bffbb44cb05040e5

    • C:\Windows\msnsmgrs.exe

      Filesize

      65KB

      MD5

      fc3aa77df7e6002743a7ed4abf4093fe

      SHA1

      4a57658915176db558e2952d2ba142e4cc234ff1

      SHA256

      b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681

      SHA512

      eaf95a0a4e38a3ab28f35a22d890829a967811d75da7340321666dce74a0e5f520e97403bb2b74312aaf7720b945ff6a7e63cafeb37fd733bffbb44cb05040e5

    • C:\Windows\msnsmgrs.exe

      Filesize

      65KB

      MD5

      fc3aa77df7e6002743a7ed4abf4093fe

      SHA1

      4a57658915176db558e2952d2ba142e4cc234ff1

      SHA256

      b4d8cbb009ef673f1bfecb29eef8782cd1fe6bb0f3a9e852aedb7c46af678681

      SHA512

      eaf95a0a4e38a3ab28f35a22d890829a967811d75da7340321666dce74a0e5f520e97403bb2b74312aaf7720b945ff6a7e63cafeb37fd733bffbb44cb05040e5

    • memory/556-69-0x0000000074F61000-0x0000000074F63000-memory.dmp

      Filesize

      8KB

    • memory/1572-87-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

      Filesize

      8KB

    • memory/2020-54-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/2020-66-0x0000000076411000-0x0000000076413000-memory.dmp

      Filesize

      8KB

    • memory/2020-65-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/2020-62-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/2020-59-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/2020-57-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/2020-55-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB