Analysis

  • max time kernel
    54s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2023, 12:45

General

  • Target

    a381e7f85b801667feadd0a06ef8dd25395c652f93529be418d31eda5a0bd82a.exe

  • Size

    25KB

  • MD5

    cfdfa1f5a42beb1d2ba7f468727d1b7c

  • SHA1

    67cfa47032d8793b5019469c95c1902625ee92c9

  • SHA256

    a381e7f85b801667feadd0a06ef8dd25395c652f93529be418d31eda5a0bd82a

  • SHA512

    f065a6ab48e8c7337d8718d2122358df0d587e2e8e2bb0fc20c7b9b500607b901400489eb15db14e246b4b3379c993e4499834e4fc99cc7870bbc470335cfacf

  • SSDEEP

    384:Hxcn+6LD/DE0rH6lP8Hb8F/7M/kiDi3Mhe3wNzC9l/QHtgxAZCIny5c8:HenzHbrA8QB0i3Mhx9slqUeJy

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a381e7f85b801667feadd0a06ef8dd25395c652f93529be418d31eda5a0bd82a.exe
    "C:\Users\Admin\AppData\Local\Temp\a381e7f85b801667feadd0a06ef8dd25395c652f93529be418d31eda5a0bd82a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\system32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\okNDnlRDed.js" "C:\Users\Admin\AppData\Local\Temp\a381e7f85b801667feadd0a06ef8dd25395c652f93529be418d31eda5a0bd82a.exe"
      2⤵
        PID:1724
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:804

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      23a6114fa9b440e935feb056cdf27df5

      SHA1

      467d323d7f1dc36f9c1627bcc0a6e1f251eed698

      SHA256

      c08083c8b6951e43a75096c573636c302f49f4e5323817a5a0b0c41003f0299f

      SHA512

      18aeac8cd234a6e3d3b3b2ddaea7f706a45614be653910cea5255f28de93309583d183cbba8db48f1635cd99651fdd65650c64ceb688b0d76ef80cf2aa4069c5

    • C:\Users\Admin\AppData\Local\Temp\okNDnlRDed.js

      Filesize

      7KB

      MD5

      eb3af3c96b0bb8784f72a5364d199cf3

      SHA1

      8de6954e17b0ea1af2452c18f59da1a95d1e10e2

      SHA256

      808837e808cdb03f1c5febaf9c4dee2e923f38b07eb86c0e03b7af10ada1cdba

      SHA512

      481b8650a36bc2f50c4466b5eda1c344e2077ec29612f860de7dec115f6d9363bf7d994e92456ca82023fc2c3124850b91857669811006984293e7dbcc9ba788

    • memory/792-54-0x00000000763D1000-0x00000000763D3000-memory.dmp

      Filesize

      8KB

    • memory/792-55-0x0000000000010000-0x0000000000025000-memory.dmp

      Filesize

      84KB

    • memory/792-59-0x0000000000010000-0x0000000000025000-memory.dmp

      Filesize

      84KB