Analysis

  • max time kernel
    75s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2022, 18:22

General

  • Target

    updater.exe

  • Size

    309KB

  • MD5

    61a7125c6dbbb61bb9f5a60b185fde9f

  • SHA1

    ba973f15bb2dbf88b609f23bb205aa2b6d9bfd76

  • SHA256

    f18e3a8790ce99233abdde6f23e392c98a8bbdb6aa57e03e9b3fbe48313fc1c7

  • SHA512

    74467ecab2b4ee2a0c60a26d971172fb1c1ed6c608b9c20bfd18b4f3e3afa524f9987b64c536cb77632fb7e7f3e84299e6e5e1a66b24bf0fd08a77e137b3f3f4

  • SSDEEP

    6144:XLtG2JogERZt3FqVNopDsTUvEKpLV/XqelWBgrM:JG2Jog6CVmsUvrnLWb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\updater.exe
    "C:\Users\Admin\AppData\Local\Temp\updater.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://windows-repair-toolbox.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4edb566747d6ce01b22b1d4c83c1093c

    SHA1

    5a2046ccf0478387768e218c8b9a23aae57cb8ad

    SHA256

    c307d378a6d016337b805004b3edcbc30fc0c1af41f748432e01f7539f63f7c2

    SHA512

    1a92e4a0d19b839753d24f3d3e4ac196ade9ab5e2706bbb0d4a4b944ef7b6ec3fe066ecc3056228a6fd401f6a66c74fdd60e3dd8e0eeb215abdd2d87195f14b2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    6KB

    MD5

    a0b8af42a3bd86fa1a71a9127b3878f3

    SHA1

    cc071148cd44f5280b579ca1f4f2b233d6eed007

    SHA256

    68928f755c4b6c0821b8edd8eec88360eb306646d04452f2a35f5540bf7664b1

    SHA512

    f8a8a6ab1df9505c2915830a7deec285890afaaeab0c5abf7960d11305727ae357ac4a33faf781fd39e7a437c8cb8bdee58d412b50522a3247c66676043ec1c7

  • memory/1340-54-0x0000000000A20000-0x0000000000A72000-memory.dmp

    Filesize

    328KB

  • memory/1340-55-0x000007FEFB9E1000-0x000007FEFB9E3000-memory.dmp

    Filesize

    8KB

  • memory/1340-56-0x000000001AE96000-0x000000001AEB5000-memory.dmp

    Filesize

    124KB

  • memory/1340-57-0x000000001AE96000-0x000000001AEB5000-memory.dmp

    Filesize

    124KB