Analysis

  • max time kernel
    50s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 14:01

General

  • Target

    66487f714d7d5b7d27dcf330c07c2c4ac41398d49853d8ef6f3533e43f0a27ef.exe

  • Size

    88KB

  • MD5

    5e0c8f52cc780a593c23192dae0607c7

  • SHA1

    60fbb762f7fe57000d3e5a71fd6d103b27a0138b

  • SHA256

    66487f714d7d5b7d27dcf330c07c2c4ac41398d49853d8ef6f3533e43f0a27ef

  • SHA512

    5d8eca299318addaf5e8a0c89876dcbe0e0a535f5c7c2dae2d4f6d33cfacc4709432680780cd0ecf30097aaa29c4dd40b56cc1ab09676237f4bd4c2249f23a0b

  • SSDEEP

    1536:WFL2kw+kmWSNBRV5+FEZGudDPAaTgXM5:Wp2kw+km9BRwuGgsak85

Score
7/10

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66487f714d7d5b7d27dcf330c07c2c4ac41398d49853d8ef6f3533e43f0a27ef.exe
    "C:\Users\Admin\AppData\Local\Temp\66487f714d7d5b7d27dcf330c07c2c4ac41398d49853d8ef6f3533e43f0a27ef.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1108-54-0x000007FEF47F0000-0x000007FEF5213000-memory.dmp

    Filesize

    10.1MB

  • memory/1108-55-0x000007FEF3510000-0x000007FEF45A6000-memory.dmp

    Filesize

    16.6MB

  • memory/1108-56-0x000007FEFC1B1000-0x000007FEFC1B3000-memory.dmp

    Filesize

    8KB

  • memory/1108-57-0x0000000000B26000-0x0000000000B45000-memory.dmp

    Filesize

    124KB

  • memory/1108-58-0x000000001EC80000-0x000000001EF7F000-memory.dmp

    Filesize

    3.0MB