Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 09:53

General

  • Target

    a93d24db4644df42205cbe01db7afb11c7d0767ba3509b96472d72f1bd4a0b64.exe

  • Size

    548KB

  • MD5

    ab9481150fe8215d11c616e13df4a2f6

  • SHA1

    29c3d66fc3b61613f0a542bf41ffb5a64d9cbe75

  • SHA256

    a93d24db4644df42205cbe01db7afb11c7d0767ba3509b96472d72f1bd4a0b64

  • SHA512

    219500a87890c6721ab758abeee101527b5c97d7c2968f440b55620e72f3b2bfe07ddd0b64c1e19fdf4606b97797205e7619b038f184864bbfb71fe3d1a3144a

  • SSDEEP

    6144:zau1UioOm1xJ3T1h/YoU+oBWGRTFo9neex+2LQKHK:zau1UiowWGxax+2L

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a93d24db4644df42205cbe01db7afb11c7d0767ba3509b96472d72f1bd4a0b64.exe
    "C:\Users\Admin\AppData\Local\Temp\a93d24db4644df42205cbe01db7afb11c7d0767ba3509b96472d72f1bd4a0b64.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=ZvizXaqutWM
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1800 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    ccf7ddcab740be17f6f4d490fbc121a3

    SHA1

    7fdbf50ba37f7d741b5344b6c3b330cba354f1ea

    SHA256

    95497d743fc269f7f8edd0888b031264ece8fc9b6f2d7aad051b909772f53ab6

    SHA512

    4b3b84163a700db88d81493344b09ca88198c4894d4accd83bf9cfae5f79c40b6cbabeb2f5a444f005962fc7b95e99b6ea610be87961d5f6e70fb2173a312b77

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    5KB

    MD5

    721ea0dc49147b4f5fc4f1db9722baf2

    SHA1

    15e578518802bf14a7e82a79e9881d5a4ea61412

    SHA256

    98f68384dd004cb0252ba9d014ef7b88923ab67dc249f5da059c54875a7458a1

    SHA512

    74137141fd1a6b1765e938b1180107481371d671af3f657d718188d5a2d26c6d540644c82040a65a2607a1c75238bf0cbb645c52b79f23c9ba0db3d2164c848c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\39TYNJWI.txt

    Filesize

    601B

    MD5

    7b63816883453d9d34fbb83defc1d1ea

    SHA1

    d6403fbb2c678f31c3d7773039d9997409e36dc2

    SHA256

    1e49899c66b9ad32b85548448d5cce0b25130d052cbf6794fde115f2b57bdcf1

    SHA512

    7dc2fbe6bdca52bf2267a9e32b43e6e1b378698547f4c226de85d7b84f8f9e511974798addaf47ac29e6dcb404bdce07f133411e0c42049a5fe4b88c09def249

  • memory/1672-54-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/1672-57-0x0000000075841000-0x0000000075843000-memory.dmp

    Filesize

    8KB

  • memory/1672-59-0x0000000003080000-0x0000000003B3A000-memory.dmp

    Filesize

    10.7MB

  • memory/1672-60-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB