Analysis

  • max time kernel
    145s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 19:02

General

  • Target

    c7f56169cff22e4dd66e6c368c4aa7ea9153ca65d34e1383ac214f4c8576607c.exe

  • Size

    286KB

  • MD5

    0c89a7f0acb3f3da130cf6358063d5e7

  • SHA1

    26f83e7fd79d227b892e49db1becfee8442a4b48

  • SHA256

    c7f56169cff22e4dd66e6c368c4aa7ea9153ca65d34e1383ac214f4c8576607c

  • SHA512

    4aaafe5d0a80582767e9c2d4deab44cd05e81d9f4da1d89a22365ed017edcf80372c60da12cda1a288bcfb1e2b63c8a9e2f45af48572487f4472ee7230c65e82

  • SSDEEP

    6144:3zynM6mVv1bYE8P23jbrry6BjvMtUQFPYVFtuChJHgVXOgDDI9QZtooiNn6ex+2W:3GnBmQZmfx+2L

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7f56169cff22e4dd66e6c368c4aa7ea9153ca65d34e1383ac214f4c8576607c.exe
    "C:\Users\Admin\AppData\Local\Temp\c7f56169cff22e4dd66e6c368c4aa7ea9153ca65d34e1383ac214f4c8576607c.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=FvCdqOQZQuk
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51d8b209a9a5d9c075d83ec808989f61

    SHA1

    d18f44e7f63764597c5048e34bfc490f4af227cf

    SHA256

    a3eabbf4dc79dfabf364f406c5a4f42f7dd9f1a67a4f2aafcca269ec40f287e1

    SHA512

    aafac04128b3deca53b3fe8ba004ff8cc723685e13744fbabf3619d77f5ccad95690083be87917d86d20bd126ef434084371056d1e7644486530dd954397b7cc

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    1KB

    MD5

    bc42e0d051d615830165b8b70239d34e

    SHA1

    a672208527b824d97879a35c520ed9fece975eb7

    SHA256

    ea71694d9bfd7d88b3ae93eef7e59c2a4630cfe94216a2f9e78df7b28a81e446

    SHA512

    223f117e7c6b145acffe597e4c259c5d2edd51080cbcd1ebf32ea082f87f8fb41555d05bfb260823886960a1b1d0f87fdc1a49c7fdca204c51cda4e57bf13d29

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8YS54Z3G.txt

    Filesize

    601B

    MD5

    444eb26510b8463eecdcbdac4da472fd

    SHA1

    df5f07170b82d679bb96a9b9c17fff279b2e81e1

    SHA256

    a9adac115bf6887dd9da62d8d1b0d1907379fa93120963cff68659a0217854b8

    SHA512

    a58d01934642265047cf131ca155eb24aa9395cb221eb9bbd80044102463edbe1733efc9d194b89eb9244fa0bf8ff6644b0dce99e6b855f679e96bcf400fb6d5

  • memory/1876-56-0x00000000752B1000-0x00000000752B3000-memory.dmp

    Filesize

    8KB

  • memory/1876-57-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1876-59-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB