Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2023, 10:18

General

  • Target

    1cc7a668d6118ab1755c203cd7e1c3add42dc9f58a4b6c740d495a00855083a7.exe

  • Size

    790KB

  • MD5

    5e20f68b78b973cbf5ff4284ab08d437

  • SHA1

    2260209bde061d50a5ad1fbd822da25af64b2d3f

  • SHA256

    1cc7a668d6118ab1755c203cd7e1c3add42dc9f58a4b6c740d495a00855083a7

  • SHA512

    eaae7ac79f5130dca57ab9724662dde16d9091650d6cfd7cadc9f84e94bfaee7af12fc215097fa6b2b3abd61a71c21f55b389d14e594d130a3214993b7796517

  • SSDEEP

    12288:ztvs2ttd1PuZUiMqylDxljISy1G41To6lG4/ehhWXMc:ztvs2ttd1WSiDyxxJTy44Zo6lG4Wh6Mc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cc7a668d6118ab1755c203cd7e1c3add42dc9f58a4b6c740d495a00855083a7.exe
    "C:\Users\Admin\AppData\Local\Temp\1cc7a668d6118ab1755c203cd7e1c3add42dc9f58a4b6c740d495a00855083a7.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.oneptp.com/ax/?uid=507801&ad=7
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00a25e5765cd652e607b129d46409278

    SHA1

    d3894baf8d4bc71b0452d73871d7d5d6e8808461

    SHA256

    de91c921fecbeae9bf4a0cdcf47747df6b7053e918d8c19e28d215087d18b288

    SHA512

    8a06e13be6ba615e93390e018caa6d848fbd7b8484e4fbb24c4929e2f24d79db75db965443f40dc27200b50f0f42348ecfd750217968ad677a50d8ec10750f0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c23cda4b0e547b02d35519cd017f68d4

    SHA1

    04c7c0185b817e39d2d4dd774409b51a1db5c151

    SHA256

    d8894fd01df94206dd5e2b55d34ec1219a9e57ea749c0acdf3c38e4d8cf256b6

    SHA512

    4bb41e1b161e4514ac7ac14c013c4c0da7272559530e0f624d67c5a22b2bef24438477143e076110f2113c674b3d3d6c034992689346bdb707413b1f535feab6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b45c36b8dd68c118e767706d79d40f7f

    SHA1

    2a63665038082516c1902692bab3ab46c3cfe366

    SHA256

    ee1aa089bbbe5df64220ff359b2340742cc0a53c5cb184dfd0a4e74f6f32f4f4

    SHA512

    365a7bf20b1ac3972d07cb3a6e64eea0633bd17f45eb9731a8e81be5e0151d5ba531c2bd9d4c3c7564b0e15672d50293dede653cc9aced467064f4c019bedbb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c968fccf5fed3dd502c9196df7abe006

    SHA1

    ba48a08f8db7c0bf7e3d57032e6f18a14281cc2e

    SHA256

    fa52a9c9573a964635699caed18b7758b17164815c0cf0aa0f2614acec5162b4

    SHA512

    328b3623a5801bf5d21c6b095dd350ab58fda99e81eeb351c32fbf0883a6fed92448b9fd91b5f5d39b9df72dff7de2220bd941bf8dcc7c6c956827105e4c81f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47e73e3747816d77e32456caceb1c8ae

    SHA1

    b981473314de04d840cb2d5fd3248e4c52d9b5cc

    SHA256

    d93a069033517c50fae3273967594a503fa1bc1a70830369bb1e2aade602f422

    SHA512

    c16599ff4195900026a0f6eb8175959061ba10a24a46c34b459085e8dd18dbd23e5dab394415ea3f2be2b328c241c4ff7a174e69baf9706c7572ea9f470f8298

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    104792d391e0e7c76646825c234076b6

    SHA1

    af0ec0e90d578767d633a0e543531c90c2333c1b

    SHA256

    c2dd812ad6077c483f71f2df32d4d50e7411da0d69c760876c21625fbf7cec24

    SHA512

    50f12d132f8b30c6df140c073e5ccae3ff2a2773947ade0ef50b1ce240d798694cea477b79f389be5b63372d39c4a1fd0fb8784df2a3b543bcda1cf3785578ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f4afac09e35bc984716373daefd46fd

    SHA1

    f7b5596e55b5c7bb0bc1dd68934d5d3d46de3293

    SHA256

    3eb0f880a862dd279bc3d3009ac5bfb14b19778e46ca7d46429856ed7f5e1282

    SHA512

    2669b831e0749fea96b85971142c8fe0aa811246ffb04496c4500634d941002f7be951e97ed0e30da034c7e48a3942cc9c79e45c57e3f263a6b707003f84ad3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c79dafb4998ac96038ce8f5565a6fb0

    SHA1

    1f4930251dad0262ac52446e5da8b064c766193a

    SHA256

    c56923f469354a4cb2e8e814b2d70374069b8ea339a3ee6de7dc71c45a9152d1

    SHA512

    f2fefeea2626fef45d45969c9561d893806391d3120599d19237ec9efd0fdaea52e552dd1c42a205c029320757875fd37adbae43d8f6d378934bee9e9f5cea92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2013ad1ec3e59d42ef2a8e8104809586

    SHA1

    3da09f48123eb574f735e062e5dd71e5d5492ec2

    SHA256

    f68acd175e6be275c0d3ece79c3fc29eb761cce227a539cabfbda14d036c8bdd

    SHA512

    a0455244e65e55acd74928ca93d59771d522f0071408ca5908e0bfff13947af381a6b9916c72e11164531bc5e7cb1349f1435f44762b49f3a929a58c6cf7357d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    455eaacfcf548e1c5ff0f3b2ec86046d

    SHA1

    8051a45d6038f0ed54fe6327d515b1949422090f

    SHA256

    59344757cda96c84cc91e61499a4feb0ba4c912262f96fd2601d03232c167ad8

    SHA512

    e2583cbb7e1594a1494212582e3fd69010a25b2ac777f397bf2c0f291506345edc3ac4b00559ca1434a69d5734c539527ba6b1aa3ee76971666ac8067891f8a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    963f6e6b080256562dfa7b5746f50d4b

    SHA1

    27a08334de2256c92ad02095ecca085441ac00fd

    SHA256

    f8c246fee7ae06e1f7b760ea3ef5884407b9526fe4d298ca4c8c56c7c3496f70

    SHA512

    708412bc238a4a5a42f64f6fa68e13fb8758bf57ff5afb330abe130fb9313b4e2a03a3f1a516504b1bbfe7cbdd7d3e5322c5616b2eb0ea31fe8d8ca9f9c9a422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e518bd691c456d0ab9ce8e649f3bd7d

    SHA1

    e20f7f1f7a3d63142d3b7e516feb558685509067

    SHA256

    1d1a318705c86f8f9ba858813f1cf7911b2091a215cf34c019e97da36afbce14

    SHA512

    92358abb0faa2f7d0339d95f0de279a8c90f45b47f2e5d66e018c2c8e810fe694c674190eda19c73e3d20d2c0d3476e959f352adf88a54efcf14718db2f9064d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab7273.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar72B4.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\Tar78E2.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1HQAVOR6.txt

    Filesize

    608B

    MD5

    b42635e95ba9d24f7a355c767c109f64

    SHA1

    f39c855152c0a149326e1e86b132890b88cecf3e

    SHA256

    753893a068d5c792dbbd1bbe3c34dff697b9a4221f2546a10851c71a370114a9

    SHA512

    4c2cd8039f6121a722a0c3109cb1c9856a797fb1679be0aafe7fd26a9c3e3c896dfad5c9fbb291bf3fd2d4955208e6f502f30ec7b798ca661ee2d1c297b3486a

  • memory/296-72-0x0000000001150000-0x0000000001152000-memory.dmp

    Filesize

    8KB

  • memory/632-71-0x0000000002890000-0x00000000028A0000-memory.dmp

    Filesize

    64KB