Analysis

  • max time kernel
    909s
  • max time network
    912s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2022 07:03

General

  • Target

    WindowsDefenderApplicationGuard.wim

  • Size

    30.5MB

  • MD5

    e069ad898b074b8cf98256516aed064c

  • SHA1

    a040057d2edf90ebb14b90a52b92eeb5b5d1faa1

  • SHA256

    d215f9c3834c64134eb60d6b64ae143409e76570d5d9a4f3488a1e8aba9ab8b2

  • SHA512

    e86b57c2a62046e46b8b5edebdd59a4f39d4a198cf83af8086bbfb559b22ae8b586833077f6092a94627ed9a32c9fcb413106f63a160290900d725ed1535132d

  • SSDEEP

    786432:M8mV0NuwtR/8+GDp9ULmz1MXxc9cy8avU5FVYiqV7pbM:M8mV0kwtR61yLmiBc9ia82I

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\WindowsDefenderApplicationGuard.wim
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\WindowsDefenderApplicationGuard.wim
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\WindowsDefenderApplicationGuard.wim
        3⤵
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:268 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:980
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\WindowsDefenderApplicationGuard.wim
          4⤵
            PID:1744

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3SFFC8GE.txt

      Filesize

      608B

      MD5

      a37a1db84f1f3fb81ada7086251d18e0

      SHA1

      31e8c9a06b1c5bed02363581d09aa946abb78e62

      SHA256

      18821f93bd574817dacc47af7d4e429b66664c7bffb0d4615a96e9581d1a91bb

      SHA512

      ad81cbb3235af73191c6b5f8e96e13166fa1f4a8cd86b18a29e6523780c4fab2b1d3f586bf24cbdce4d5ebeb6b197bac82acb721e73c591dd987d9a6f93ad228

    • memory/1832-54-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmp

      Filesize

      8KB