Analysis

  • max time kernel
    85s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    31/01/2023, 21:14

General

  • Target

    https://docs.google.com/uc?export=download&id=1yUruRP-TamdyfHm4P23d3rybhn-2RM5Z

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies registry class 13 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/uc?export=download&id=1yUruRP-TamdyfHm4P23d3rybhn-2RM5Z
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1716
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\DOCX_FACT_FE-875.tar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:480
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\DOCX_FACT_FE-875.tar
        3⤵
          PID:1752

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            aca731cba7e303fd89738cb2f9f76c95

            SHA1

            a0a83fcd4b87b311713e78eb8e3c87d5dd389610

            SHA256

            a44fa5fae2843b4fe1c9bb110b3749fe46e3285bf5a9a675ab9adcaf13f6af82

            SHA512

            522aa21de5b0dda13249b78bda695021eace6eea2592e94d0cecf29e45f7a8cdf302d16b8ab7b872908a1ddb62cd8cb86ea04ef873d39e2d863b10f4b5177a64

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XOZ2I9JS.txt

            Filesize

            608B

            MD5

            5a9de9975296d2301b3ea07375c264d1

            SHA1

            29636908df8531ed216979cf2d2d57c1f8da75f3

            SHA256

            ce1a690bda1009daaa754968769c979417d3f19a8b5e5d23eb89126f00028777

            SHA512

            d8e61583fa615e5e893553b1cc07716b1c6221551abef50066d5f772f051fe26494fe50b76e484628ed124d0239779b452a6887847234baafda5da3460a8d733

          • C:\Users\Admin\Downloads\DOCX_FACT_FE-875.tar.ykqd4ld.partial

            Filesize

            721KB

            MD5

            cbb47f4b9535ac7a34c8d5f0d3f01bb5

            SHA1

            269685cc104aa0eab3cc12deeedb684b3ed28599

            SHA256

            c0b12fa3db62bc736dd93176c4b295fc3461cc722b03bcaf4aae6e47d62b1d69

            SHA512

            8d6a920ed935dc3b7f9d7169d5834b12a705cb7a444c84a675c40022ae11be71b3228c8f2198e9483093fd9d14289caa22da72efd043c46f877c84695ebe76e2

          • memory/480-56-0x000007FEFC101000-0x000007FEFC103000-memory.dmp

            Filesize

            8KB