Analysis

  • max time kernel
    172s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 19:09

General

  • Target

    b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad.exe

  • Size

    778KB

  • MD5

    62c8830d74964a8e0596da6c628e5afc

  • SHA1

    264dac13bfd83a02b5c0856dda6403f882a63ef2

  • SHA256

    b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad

  • SHA512

    a3c134e3b7b476b91463efedf5570bb050d528fd64f54f0bf98fa3b68bdce880c962a7d5dd8d2084f0802eb385a70f586e5d89d127c937a5bbf5cd98817dca79

  • SSDEEP

    12288:cu+6uRIB6yfR+1rIKAKXPWXQGhg11DxgXA8ZMG9h/MgSbvfVlW81utPp:c76rEyJYrIQFGhgXl8CG9h/M5T9l9uth

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad.exe
    "C:\Users\Admin\AppData\Local\Temp\b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\Honhcservice.exe
      C:\Windows\system32\Honhcservice.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:888
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:888 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1312
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\del_b.bat
      2⤵
      • Deletes itself
      PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

    Filesize

    72KB

    MD5

    f79ee77a4f30401507e6f54a61598f58

    SHA1

    7f3ef4945f621ed2880ff5a10a126957b2011a17

    SHA256

    cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8

    SHA512

    26ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739

  • C:\Users\Admin\AppData\Local\Temp\E_4\dp1.fne

    Filesize

    124KB

    MD5

    a062fbf36321864ac8e7e2e408ff0d90

    SHA1

    8cc46a09096eb373e5e01d7547f108eb09bbac9d

    SHA256

    249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431

    SHA512

    2ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819

  • C:\Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    406KB

    MD5

    c3807c0338c0d375f810afb236cb7200

    SHA1

    92522e6145c0eaa35716afd575eea2e6c3c729d3

    SHA256

    5e4972260a7130a96c353ababbdd887e0e2431f0388b8368357527d2311584dc

    SHA512

    ac3bb279c3a599df315d1bba8c65398fb1f8ddde06e5e558dd533bfa4216c0b45f91624586e8584d2b2879f6b9885599f2abf74d5125ca0f1ca4f74242de2668

  • C:\Windows\SysWOW64\Honhcservice.exe

    Filesize

    778KB

    MD5

    62c8830d74964a8e0596da6c628e5afc

    SHA1

    264dac13bfd83a02b5c0856dda6403f882a63ef2

    SHA256

    b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad

    SHA512

    a3c134e3b7b476b91463efedf5570bb050d528fd64f54f0bf98fa3b68bdce880c962a7d5dd8d2084f0802eb385a70f586e5d89d127c937a5bbf5cd98817dca79

  • C:\Windows\SysWOW64\Honhcservice.exe

    Filesize

    778KB

    MD5

    62c8830d74964a8e0596da6c628e5afc

    SHA1

    264dac13bfd83a02b5c0856dda6403f882a63ef2

    SHA256

    b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad

    SHA512

    a3c134e3b7b476b91463efedf5570bb050d528fd64f54f0bf98fa3b68bdce880c962a7d5dd8d2084f0802eb385a70f586e5d89d127c937a5bbf5cd98817dca79

  • \??\c:\del_b.bat

    Filesize

    266B

    MD5

    5fc2b518cd1d46c69ac421bc72d85628

    SHA1

    e672455ffa657bcb7a272324342af6e7c4fa148a

    SHA256

    2dd3d0fe01d628daa41676ed06e447e8c6d081c7bf87325d4679169a0c1c664a

    SHA512

    b586818151d44a768bda7dfe7808560dd5e1e6756149f834526df401e91d22ae305f286f4467916d93a215a32323bf2476c19f68777f692b2d70869f69a0b210

  • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

    Filesize

    124KB

    MD5

    a062fbf36321864ac8e7e2e408ff0d90

    SHA1

    8cc46a09096eb373e5e01d7547f108eb09bbac9d

    SHA256

    249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431

    SHA512

    2ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819

  • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

    Filesize

    124KB

    MD5

    a062fbf36321864ac8e7e2e408ff0d90

    SHA1

    8cc46a09096eb373e5e01d7547f108eb09bbac9d

    SHA256

    249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431

    SHA512

    2ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819

  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    406KB

    MD5

    c3807c0338c0d375f810afb236cb7200

    SHA1

    92522e6145c0eaa35716afd575eea2e6c3c729d3

    SHA256

    5e4972260a7130a96c353ababbdd887e0e2431f0388b8368357527d2311584dc

    SHA512

    ac3bb279c3a599df315d1bba8c65398fb1f8ddde06e5e558dd533bfa4216c0b45f91624586e8584d2b2879f6b9885599f2abf74d5125ca0f1ca4f74242de2668

  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    406KB

    MD5

    c3807c0338c0d375f810afb236cb7200

    SHA1

    92522e6145c0eaa35716afd575eea2e6c3c729d3

    SHA256

    5e4972260a7130a96c353ababbdd887e0e2431f0388b8368357527d2311584dc

    SHA512

    ac3bb279c3a599df315d1bba8c65398fb1f8ddde06e5e558dd533bfa4216c0b45f91624586e8584d2b2879f6b9885599f2abf74d5125ca0f1ca4f74242de2668

  • \Windows\SysWOW64\Honhcservice.exe

    Filesize

    778KB

    MD5

    62c8830d74964a8e0596da6c628e5afc

    SHA1

    264dac13bfd83a02b5c0856dda6403f882a63ef2

    SHA256

    b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad

    SHA512

    a3c134e3b7b476b91463efedf5570bb050d528fd64f54f0bf98fa3b68bdce880c962a7d5dd8d2084f0802eb385a70f586e5d89d127c937a5bbf5cd98817dca79

  • \Windows\SysWOW64\Honhcservice.exe

    Filesize

    778KB

    MD5

    62c8830d74964a8e0596da6c628e5afc

    SHA1

    264dac13bfd83a02b5c0856dda6403f882a63ef2

    SHA256

    b7cbe70c6843536da3eba3090d1f6593c511d640f289546c439fe616b7395bad

    SHA512

    a3c134e3b7b476b91463efedf5570bb050d528fd64f54f0bf98fa3b68bdce880c962a7d5dd8d2084f0802eb385a70f586e5d89d127c937a5bbf5cd98817dca79

  • memory/992-74-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/992-80-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/992-79-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/992-69-0x0000000001E10000-0x0000000001E31000-memory.dmp

    Filesize

    132KB

  • memory/992-75-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/1056-71-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/1056-73-0x0000000001EE0000-0x0000000001F28000-memory.dmp

    Filesize

    288KB

  • memory/1056-72-0x0000000001EE0000-0x0000000001F28000-memory.dmp

    Filesize

    288KB

  • memory/1056-77-0x0000000010000000-0x000000001012A000-memory.dmp

    Filesize

    1.2MB

  • memory/1056-55-0x0000000075E31000-0x0000000075E33000-memory.dmp

    Filesize

    8KB

  • memory/1056-70-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/1056-57-0x0000000000250000-0x0000000000271000-memory.dmp

    Filesize

    132KB