Analysis

  • max time kernel
    101s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 12:07

General

  • Target

    d9911e4cfd218a3c827bd3235eb6cb8fb87e50d56a53bbab5b67c6a46b2e15a7.exe

  • Size

    183KB

  • MD5

    da7f28a346445f10e95c6cf46c12e875

  • SHA1

    e5f981e70068151efe769173b9ca96909916eefb

  • SHA256

    d9911e4cfd218a3c827bd3235eb6cb8fb87e50d56a53bbab5b67c6a46b2e15a7

  • SHA512

    e50d276689235c2621980cd6845fdca87c2981814fcca61420d60c29aea7d4a44fdc54c2de0a19443070c6e8651a15f4b5f2499ecb285d753a3bbf75ad6de058

  • SSDEEP

    3072:ggXdZt9P6D3XJE45iOPsNzQ6cu5xvByDNqioZItk6C0UYo6wGBKYSA1sNzQ9:ge34+NOPsN0u5nyEi4tx0UYo6wG/sNa

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9911e4cfd218a3c827bd3235eb6cb8fb87e50d56a53bbab5b67c6a46b2e15a7.exe
    "C:\Users\Admin\AppData\Local\Temp\d9911e4cfd218a3c827bd3235eb6cb8fb87e50d56a53bbab5b67c6a46b2e15a7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Program Files (x86)\Shop_Matching\Shop_Matching.exe
      "C:\Program Files (x86)\Shop_Matching\Shop_Matching.exe" A100354348
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1292
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Shop_Matching\Shop_Matching.exe

    Filesize

    200KB

    MD5

    594566ae4e389635b42f8f3daa29392b

    SHA1

    adfa9933797e9fb597482166a5f68c9c4222aa15

    SHA256

    7e2db4380cb85a361031a2545ec1ca9ee5e79eab997badb163706eba14f270a0

    SHA512

    4a88a0b33ee39ad910ee7daa7fa0964730c054f76e6e43a33e3843482f445bd79c401d80b131c75d841838b71e4b1cc33e1398d85c7af2ea71974f73382d7e80

  • C:\Program Files (x86)\Shop_Matching\Shop_Matching.exe

    Filesize

    200KB

    MD5

    594566ae4e389635b42f8f3daa29392b

    SHA1

    adfa9933797e9fb597482166a5f68c9c4222aa15

    SHA256

    7e2db4380cb85a361031a2545ec1ca9ee5e79eab997badb163706eba14f270a0

    SHA512

    4a88a0b33ee39ad910ee7daa7fa0964730c054f76e6e43a33e3843482f445bd79c401d80b131c75d841838b71e4b1cc33e1398d85c7af2ea71974f73382d7e80

  • \Program Files (x86)\Shop_Matching\Shop_Matching.dll

    Filesize

    104KB

    MD5

    6ee6329d1cc50594cb838e5633373f78

    SHA1

    d106fa3d30016606ee9b228a397eba7dca4a7b82

    SHA256

    d9a047a79822b98d9b8c66242461875e9d0fd926dfdee9583bb421718d57f734

    SHA512

    084497260caaa1f14f4ae6041929a558f62f0860154f9b01b812fc242692f192d3568a6b54b4c0256f43cee37fdf362a5f1a8a42f58152eef3ce0c767d9b12d5

  • \Program Files (x86)\Shop_Matching\Shop_Matching.exe

    Filesize

    200KB

    MD5

    594566ae4e389635b42f8f3daa29392b

    SHA1

    adfa9933797e9fb597482166a5f68c9c4222aa15

    SHA256

    7e2db4380cb85a361031a2545ec1ca9ee5e79eab997badb163706eba14f270a0

    SHA512

    4a88a0b33ee39ad910ee7daa7fa0964730c054f76e6e43a33e3843482f445bd79c401d80b131c75d841838b71e4b1cc33e1398d85c7af2ea71974f73382d7e80

  • \Program Files (x86)\Shop_Matching\Shop_Matching.exe

    Filesize

    200KB

    MD5

    594566ae4e389635b42f8f3daa29392b

    SHA1

    adfa9933797e9fb597482166a5f68c9c4222aa15

    SHA256

    7e2db4380cb85a361031a2545ec1ca9ee5e79eab997badb163706eba14f270a0

    SHA512

    4a88a0b33ee39ad910ee7daa7fa0964730c054f76e6e43a33e3843482f445bd79c401d80b131c75d841838b71e4b1cc33e1398d85c7af2ea71974f73382d7e80

  • \Program Files (x86)\Shop_Matching\Shop_Matching.exe

    Filesize

    200KB

    MD5

    594566ae4e389635b42f8f3daa29392b

    SHA1

    adfa9933797e9fb597482166a5f68c9c4222aa15

    SHA256

    7e2db4380cb85a361031a2545ec1ca9ee5e79eab997badb163706eba14f270a0

    SHA512

    4a88a0b33ee39ad910ee7daa7fa0964730c054f76e6e43a33e3843482f445bd79c401d80b131c75d841838b71e4b1cc33e1398d85c7af2ea71974f73382d7e80

  • \Program Files (x86)\Shop_Matching\Shop_Matching.exe

    Filesize

    200KB

    MD5

    594566ae4e389635b42f8f3daa29392b

    SHA1

    adfa9933797e9fb597482166a5f68c9c4222aa15

    SHA256

    7e2db4380cb85a361031a2545ec1ca9ee5e79eab997badb163706eba14f270a0

    SHA512

    4a88a0b33ee39ad910ee7daa7fa0964730c054f76e6e43a33e3843482f445bd79c401d80b131c75d841838b71e4b1cc33e1398d85c7af2ea71974f73382d7e80

  • \Program Files (x86)\Shop_Matching\Shop_Matching.exe

    Filesize

    200KB

    MD5

    594566ae4e389635b42f8f3daa29392b

    SHA1

    adfa9933797e9fb597482166a5f68c9c4222aa15

    SHA256

    7e2db4380cb85a361031a2545ec1ca9ee5e79eab997badb163706eba14f270a0

    SHA512

    4a88a0b33ee39ad910ee7daa7fa0964730c054f76e6e43a33e3843482f445bd79c401d80b131c75d841838b71e4b1cc33e1398d85c7af2ea71974f73382d7e80

  • \Users\Admin\AppData\Local\Temp\nst22CE.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • memory/956-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

    Filesize

    8KB

  • memory/1292-59-0x0000000000000000-mapping.dmp