Analysis

  • max time kernel
    162s
  • max time network
    213s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 07:41

General

  • Target

    c14c9cee32b1656a0265dc4ed12ead2e120c52be5d82d28b9ee92e6d459da922.exe

  • Size

    280KB

  • MD5

    30ee56f650214d344627bd8d75fbcff2

  • SHA1

    43ae057fdab2ade6648a791f99a20532f8082f99

  • SHA256

    c14c9cee32b1656a0265dc4ed12ead2e120c52be5d82d28b9ee92e6d459da922

  • SHA512

    f1b198e6aa91913081c8918e204c6d1a55eb2b0bce54f95e0979f904feda1e28c073f335a4ae6753c58b3f623c82b2c0de764edc8c6b80320c5ceb962356a216

  • SSDEEP

    3072:p/GPlxboMBZOO6BRtUYH8MEGPlxboMBZOO6BRt9F2UruXknAeO5x9448yKz8SrsJ:p+dx1fKdx1fMQOAv

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c14c9cee32b1656a0265dc4ed12ead2e120c52be5d82d28b9ee92e6d459da922.exe
    "C:\Users\Admin\AppData\Local\Temp\c14c9cee32b1656a0265dc4ed12ead2e120c52be5d82d28b9ee92e6d459da922.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.facebook.com/inidikanyadini
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2000
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x1a0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1328

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c752774f1d5d8b875315652d57c5a5c0

    SHA1

    ddb3ae63e4e5818d2cb785a65744a0dfcda13a49

    SHA256

    fbae9b1e1c269c9845af6f05c01b8a9a12437ff8c4125a06d1616e2dea1093ca

    SHA512

    2c9df5cb2c094879e81ba34d9ef23cc6ab8a2b50bd3a0e2a90d493b7671e6f2044e80f3a38abd6874a81e8d41a54d4f9db1dd016a16e2df05a6fe1a85de9ea27

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    6KB

    MD5

    ea427bc28da27b33ff27286839b631e6

    SHA1

    25e6cc1a6127537b65087e67f12a385d0c3493cb

    SHA256

    139ecccb8330e2e8274b31f3482494a062529effdab071ccd82e39dc7e94074e

    SHA512

    01ed63ee6e8b3635e6d358e07c1ac8398506bee66595597fba8a2015cf69faca1ffbe737d1d6ffb984e5e0e7f019b3336ed00462584f9425f684aaf36addc25a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WLROR1W0.txt

    Filesize

    601B

    MD5

    3656b8211e0e18073081bc954d74084f

    SHA1

    9c069f285073b4d852aa1f48a12318501816284c

    SHA256

    9ae033bf099bedc0f24f702cd50325771ff2b0eb1322b5c0e1b5a6cad0e3d1a9

    SHA512

    118d7530418a3a2162b95cb985b072d23638a5ade472f08b9d8833eaacfbab615937991512f3924262a88dd86a6c6f5ecbf03e401a6433adbeefe60811daaa5e

  • memory/1164-57-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB