Analysis

  • max time kernel
    118s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 01:19

General

  • Target

    cea0c2b2ca76278ed27656523361cfc081bdee3f4f393f1a3c16cf8055cc0b57.exe

  • Size

    19KB

  • MD5

    1ac149de9269e54731a67c6c842a0a2e

  • SHA1

    6a848ccf6f37ba96c1defab5baf0f8cd4c9d8202

  • SHA256

    cea0c2b2ca76278ed27656523361cfc081bdee3f4f393f1a3c16cf8055cc0b57

  • SHA512

    7b2f46d2a5ce13172a27936913088ab5b7f30a749ac0a0a97c4d3eeb4b6ee1627b52b3b1765ea2881fab3590a34203d3e76a39cf8f2c64bea943a083875a2c45

  • SSDEEP

    384:UGUcG+01wYWsAtSiMyJKIeYoBccHmE9btPDbKzm9nNxwvf68Jw:UtkAWsAtSZyYIwcKmEjPDbKzyfwvhJw

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cea0c2b2ca76278ed27656523361cfc081bdee3f4f393f1a3c16cf8055cc0b57.exe
    "C:\Users\Admin\AppData\Local\Temp\cea0c2b2ca76278ed27656523361cfc081bdee3f4f393f1a3c16cf8055cc0b57.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pegadinha.kit.net/pegadinha.jpg
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GNVPF7SM.txt

    Filesize

    603B

    MD5

    f5571340d1b161d62b594a414c05af0c

    SHA1

    b4ff22179d80fbe88c849c2c40647b7986f7044a

    SHA256

    aee26acf96911cebdd087f06eec1678a89fc7b0975f02bc9526f8590f19db67d

    SHA512

    ff95934e30ebeec4d5833e36d294aa7fd96ec18c749d335aff6a7d95fe4cb4b2a03a9c0e865a363c3b9991fcdfc19e421e1f13bdaa5cce085324e9d410b422f5

  • memory/1544-54-0x0000000075681000-0x0000000075683000-memory.dmp

    Filesize

    8KB