Analysis

  • max time kernel
    136s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 00:02

General

  • Target

    e166f5fb1757ea43fe86ec180c4b771280c4f4d25bdd276243e1b808af537e50.exe

  • Size

    1.4MB

  • MD5

    b036d44c5c51f1427058c3d3ad543d20

  • SHA1

    945d5533ca9e06d4cdedd0d3afe0d7615050080b

  • SHA256

    e166f5fb1757ea43fe86ec180c4b771280c4f4d25bdd276243e1b808af537e50

  • SHA512

    74866418ddd15ff5132e8a0ff38cad8496566b2f9b9beaf67f3f2e64acde7dbbf8a023bdd956a45670c992370cc28e18b71d71a847e84d181e5a15972a93f327

  • SSDEEP

    24576:byr/4p6qO4pDlPJsZtZQk5p8hulbEwfDpBzjRvdsxlTShiVPV5:C/4Qf4pxPctqG8IllnxvdsxZ4UN5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 8 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e166f5fb1757ea43fe86ec180c4b771280c4f4d25bdd276243e1b808af537e50.exe
    "C:\Users\Admin\AppData\Local\Temp\e166f5fb1757ea43fe86ec180c4b771280c4f4d25bdd276243e1b808af537e50.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3448
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v
        3⤵
        • Modifies Internet Explorer settings
        PID:5052
    • C:\Windows\SysWOW64\Wscript.exe
      "C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft275905\b_2705.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\soft275905\300.bat" "
        3⤵
          PID:1736

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\soft275905\300.bat

            Filesize

            3KB

            MD5

            a66b77b04063418e9341e4c823d1702d

            SHA1

            6f08d3ae264f5f39cf217d8fd3f7c5e086152747

            SHA256

            87afe6c7a2fd3961ff2faf3c569ae3ecb875926afed153c667672d2a2db6af53

            SHA512

            0fd44cac5f4102693489aaab249bce97b724fe17448f09cd0827c2124e5bc0aba7a04618c80123e530af43d64b2b62c8f9a2f00b0611808a5d6b39ff12b9c3a9

          • C:\Program Files (x86)\soft275905\b_2705.vbs

            Filesize

            348B

            MD5

            82c93a0431acf1104cfde2103cf032f1

            SHA1

            7c6e1bfa45b46cf4a540bfc7db43e9958ddd1cbf

            SHA256

            c264276af66079943bc5117d9bb26c18525e51650018185daf23f7459a8f62db

            SHA512

            0c2ac40b3bdcf81e6ecd63298793415f7130142fe0a53a042f4f034c600150898c07ffd15fead13589a520d612a82227c5fb2df28ad870f0f5b49fd71be1f9f2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            471B

            MD5

            8b90c80540ac0b7f86a00f00c7adb0e5

            SHA1

            a83d1a28ce3a71303dc0eb7359182812d74539c8

            SHA256

            47d6c62ae69a38a716da5db2d4b4c95193dc1dcbebef3c55dea8c0cfb13ea256

            SHA512

            546494549dbf6e3c8fc547c3269a3564c6ba6e34ba66df238f31f6b53a35f9b46f5973deb38c7a686ee89b484b95cb0be1c4b49b5c771d38d80d42eb66885cd3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            434B

            MD5

            409cbd1aba98b89098260380a71e260f

            SHA1

            e75ed6d174bc1c0f1b5f48a5e333426690d10a15

            SHA256

            184779d7236f483264b7181cec92dfa0cb1b468b6197e87d6eb0a306e13ac966

            SHA512

            c8dcc417015ff238c96ada587ab43fc31bdb8a48cbc6984362e2e98a033a2d1951a353de0606479136703a7cfc49d16e7491550706a73eb1ce2127002c5b4f65

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\FindProcDLL.dll

            Filesize

            31KB

            MD5

            83cd62eab980e3d64c131799608c8371

            SHA1

            5b57a6842a154997e31fab573c5754b358f5dd1c

            SHA256

            a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

            SHA512

            91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\FindProcDLL.dll

            Filesize

            31KB

            MD5

            83cd62eab980e3d64c131799608c8371

            SHA1

            5b57a6842a154997e31fab573c5754b358f5dd1c

            SHA256

            a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

            SHA512

            91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\FindProcDLL.dll

            Filesize

            31KB

            MD5

            83cd62eab980e3d64c131799608c8371

            SHA1

            5b57a6842a154997e31fab573c5754b358f5dd1c

            SHA256

            a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

            SHA512

            91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nscCC9D.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\ Intornot Exploror .lnk

            Filesize

            1KB

            MD5

            9e04e5404953761831b88a78fd5cbedf

            SHA1

            205bd321e228610fc5c65852e15fb772c02ffed8

            SHA256

            14159760e5949aab7cb33ba8bc1742d36c1fbddf58b05fa93525ef4a6fc433d7

            SHA512

            4ffb03829df5aa66f3578f0797823a2c827ecb2102ca7714221518816c6307473c3a60bbec843c16d9b6b40954a50f7590d570a807111a1f099b0280874ac2fa