Resubmissions

14-01-2023 02:34

230114-c2fmgscf31 8

14-01-2023 02:29

230114-cy2qjsgf56 3

Analysis

  • max time kernel
    118s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2023 02:29

General

  • Target

    https://presercist.blogspot.com/2022/10/presercist.html

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://presercist.blogspot.com/2022/10/presercist.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1220
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\Presercist.rar
    1⤵
    • Modifies registry class
    PID:2008
  • C:\Program Files\7-Zip\7zG.exe
    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap551:82:7zEvent9222
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c9d3dd211c138707b462297cac70f73

    SHA1

    9935585d56bf63154be2fe02f53760ee7faf8ffa

    SHA256

    7b885e0a2fbd7dfbd4f7c3cc4afce8135dbdeead81be8625ec1c30a39aff7e97

    SHA512

    8e525b772d63ccb4cbef564a402078ce5d3f6dc3842944b3a380ac372b7d533e9aa00c83def3fcb3947993c705cd82328d4490692cb7d262d0de67fa245f4133

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    8KB

    MD5

    f0bd624b9b206ddf8cb89bd06661cf79

    SHA1

    ca5f1c254c1a97b5925961f0222294ab8b007acc

    SHA256

    bae7b435aee17d737d101d5ef9652445f31316d7ffd41396d23bbbe565c1704c

    SHA512

    739c78db35fc6fed796e32345cd0ad932389945f567057bf244648c9067aff85471f53b21d6bea5a72b1229c1f7086d0152b076eff1e58f1be019599fc4f5cc7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0WICA1FA.txt

    Filesize

    608B

    MD5

    0fcde7d05ed3c49ec70e00e0267cdc34

    SHA1

    8f3fad816a8cb2de761423c2bcfaf8ff7adb44a8

    SHA256

    42891b9cd3f29524223aa5f411d44c12bf85d15b9dfdc30b6d78821eb9bff244

    SHA512

    5b92bb65a3b5f67903b223d6ed7e1a9dd423e2e8e8dede657675268b4b1b562c3b5d5aa2c0e5863bcc9450a0fdb73a1e9480548c1637396eac43d0fabadc76bf

  • C:\Users\Admin\Downloads\Presercist.rar.7aoj4gv.partial

    Filesize

    21.6MB

    MD5

    4869fc57cfb4a974f4266893da3ad114

    SHA1

    37fef8fed4be2d505bc1594638d678fec8b58a9d

    SHA256

    d79e71678bc839cd3063a8d65cc6c66a041118ee1eb820f334036c0f2d88371d

    SHA512

    32fe5c1d45330e84caf0da09f126b34b39c39e38d9d340f639105f3b6207f85c14c381275fde8b375a1ed4d6ee8e98a012f3be6d5d971d6e43883ced18d4f81a

  • memory/2008-58-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

    Filesize

    8KB