Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 06:03

General

  • Target

    5920c27568593ee62a795d90f8928782d47f6826e74d5a8525e345aaf30ba09c.exe

  • Size

    790KB

  • MD5

    4102af3c9d06c6cf5846f6ec0ca8cc39

  • SHA1

    58923c22db6c4124ba559648b110ba80664f5d80

  • SHA256

    5920c27568593ee62a795d90f8928782d47f6826e74d5a8525e345aaf30ba09c

  • SHA512

    5f9b0f48c794222f316b940b6a3e8836e9e4a5f8accda004501d065f87e2c0f61ef28eaa993190721620b6989e56474ad4c4d7f07fb88b23df376345542a9bd3

  • SSDEEP

    24576:KAl8wPlxqIyLzoaAkCO54kco8lG4/GJHI:KAl8wPlxTy3oU54/lG4/8o

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5920c27568593ee62a795d90f8928782d47f6826e74d5a8525e345aaf30ba09c.exe
    "C:\Users\Admin\AppData\Local\Temp\5920c27568593ee62a795d90f8928782d47f6826e74d5a8525e345aaf30ba09c.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.oneptp.com/ax/?uid=507801&ad=14
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1BA79029EC3FFD076F5DAC2F70A18685

    Filesize

    1KB

    MD5

    10acdcbd363e8bb18bef42973fc98b5a

    SHA1

    b000860b66aa964c8b7073fe736d6c84aeb69f7d

    SHA256

    5c353cd9f6e85a408242f8e0bc0158b8e3b975173253f4c8e553b1acd5a836d9

    SHA512

    a642545beb57fc22fb18d34471be79bc7f0279266b2e317af1433e01c426062a0048d6087b5955001126a64dbe79a189c70074daf16048716b48a4d6b6dc7665

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    3828fdc09f71bd09771ea62e0cfc2625

    SHA1

    a405b9150f43b37c859783fff370b7bbba8951ca

    SHA256

    c8418a67f49f6f95916f7d316fa340762a4b453ee9276700a64a698060f43872

    SHA512

    7b5946e5ac3c06ca503adcc146050a7cdcb5d8b6aa052f5deff4ab0a57f2c45a1c640a45c46c673687f173c98cbdbc2507e142dfdf322ec94dcda230e9518e49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57

    Filesize

    471B

    MD5

    1b52bce0d5eb764e6a9161d387192246

    SHA1

    1a0afca76a2048b7ef3ff2616ad75630a122eef8

    SHA256

    b23acc86950aec7879e44da217352e74407d4016ae3f1b3ac11d06cf6f316578

    SHA512

    edb07a8a0f23baa69893e8fdb5d9065d5127171d65f61647ec33d8cf021009029105afa917945880d434ce0e4483f70319fc500fa762a97d991d68d464ef0141

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FA0A17BC17FF10008872A7205D0D43E2_608DEF97DFACECDA8E97C6F270153A4F

    Filesize

    471B

    MD5

    8e94c67afbc8bc5bf72cae2b7112acb7

    SHA1

    a43bc7e3997d1e2a791baf773db98a0ebc753b7e

    SHA256

    5e0c646415d73dca8ab2e45cf5ae925e620acb6eca62fde449f286fb014ef387

    SHA512

    a3070d5ea87e504b3e6749b52196f2d61f3dd15cba63a47e71f47440c12729b3b32603354028050c324d73c467e68b9ecd56e5ae45629b432ce11425d51ccb94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1BA79029EC3FFD076F5DAC2F70A18685

    Filesize

    186B

    MD5

    3da8d1ff320fb36b7df1fca8f9e4a461

    SHA1

    a1f493c97af6e2f89b20768baa133c0207e6947b

    SHA256

    8029aca36876064f31b3935f5eae97e7a96dfdd81a8b8d794636f9f8e252022c

    SHA512

    9c3181c6c0e99ce1542f5fbd4744b38e4faa7d3e4ed98602e11e2c73eff2a482e8ece095f8fd1afdb52601b583a45db71c3534cb74eed39b75f53affe37edfd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    232B

    MD5

    d15d6f52e1812d9e75ff8ce6639f3afa

    SHA1

    dae4ef3b401ff58351174c49cb068b494cce0394

    SHA256

    620b0d0b57b93d8d6f1026eb846ffb17036baf32b1f42129e86e44aaa4c1422c

    SHA512

    80b14aaa4bbdd399d2a0a8a1c098fe8111616711a767d9d9c3fe9988d463ed451d68aec9673affe8cba9c2e80fabc69512682d27c21fb0620429617591a64bf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c1ceef12eccdae3cf0e1e388a7265ca

    SHA1

    f4eadf5bbfda2b2b36571bb06ed27154a889e581

    SHA256

    5ab2fb0219c6a2dbd5437fda7166d2d3508146d78ed63560743d1111d5adcda4

    SHA512

    a7465e9060727db7c0dbb665c81ef875978e119027b95c5d99305afd43bfc6dea46d2521da3cddeb5612cc6d846d39eb8885f540beda8820a8cfbfa2121ec48c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebc042b581503b60e11069dd9bb77498

    SHA1

    e6728e9040fd48ac93dcb779abcaf5dc37134856

    SHA256

    b98e2fa741caa252d7caea8e84605a9139c73b6bf49c500b5f92d750cf6b0ce7

    SHA512

    0c943a3b8111634dd36d2e614ae92a266fde80b7ef88c054f6429ca7e1e216b29df79b2126e2908cb50cc43613685608f9ade520ddfa7ef283fa3ccedeb67dcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f969cf5e0e9ad45b3cd7a3fbdc7f4baa

    SHA1

    ffc4c651f42a43d749d255ab0b69642140d613f2

    SHA256

    0d1a1ac5ecf21e1bde1cc02f9cf41109b0918cccd247a6d5c1cb0586fbdb93b5

    SHA512

    59168e5199699bf9e02a60e3ffb31fa2103bfe7484b4a11bc1e3d1d8a436cdfc71de6a46c8738871e36a9bcb164cbd31e94e57765cb7a29ebd807bd3d1ab2460

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e94711c3b14bb052ee3a28e63cc64a1

    SHA1

    3300b6fb75869871c952d8a33f0a07cdc6524605

    SHA256

    26efa3c59cf62e34fcf5520756385e08c2aeb31deeb2de74d51812449b1a06d0

    SHA512

    8addcfbfc5168319566e2e692e8d17c05271a1c6133c236a31c9dba88a0d0b705d573cd7b2ef1fe6e54fe739d34cee568181484ac5e81513876d3a112bbe4beb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a58c4fb64910e87a90300b8782ba384f

    SHA1

    b0d114b1badc60fc47f8fc5484ec788912248446

    SHA256

    144cf3b5bb08197389d91560e378941d58eba256a0188c188ceb62ea8defea3e

    SHA512

    af9e3eac8569beef3770d183f816bbbb44c77603231f167dc7a150dc6130b105967f4c1114be63a22b29834bb476557bb0340179fb1092569c105653a8f996b9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z62wpf5\imagestore.dat

    Filesize

    8KB

    MD5

    fcaf83d59ade0e9f0e8729c568ac4e49

    SHA1

    48730968a5fb6e977ad5a1617ce7c7029563d9f1

    SHA256

    75769180e3ca945af1d2781f1cda09ec47cc4dbedc3e8f93d0fa86aa7126c304

    SHA512

    da133d3cedc4d79a52b753698477fdd3d06f0d7540773d69455c8ed0f334be52605b47178abd47fbfa82514df244c8e14058ef8e56189ae2e6e557dfb3499735

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMIDRLTB\436_htm[1].htm

    Filesize

    242KB

    MD5

    07b76a9119bea5649a1df7658e7bb83a

    SHA1

    4ab4e0cb7e1f8005d2dda70c20301368d8119455

    SHA256

    64e0a24d129c9c670261f923a62a9e7f8d5ff56f795b957df2ff43579b8ab2c9

    SHA512

    90386c6bca81060bb80820e0ae94897465b1a475ccf323b7df7e86cf8f615ca75861b13824944850c57cd82972100d928875663771f5777ed3765ff6a86697ea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\favicon[1].ico

    Filesize

    3KB

    MD5

    baaf7611a4a89d0821822dbc61cd85f3

    SHA1

    20ee71cd9c8ace0490b5bf1be2a0529b0c23b683

    SHA256

    da5ca5a924da32302ecc8c673e7e7f9fd73c25d6c1187d06f610b7caa8af5232

    SHA512

    2780e8f89a5286a9dd5957386836c27bdebd0dc9384a2abde0c079c3f6aa3dac089276d4d4fa7448ae34a5810e412be6004ec8d81da6f5f4c02bdaa1270d8147

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\iwt-min[1].js

    Filesize

    23KB

    MD5

    be15dd4e71a35e54bb29d50dabe457bf

    SHA1

    519c2efffe3158379f0c6d21e75a7729295bbab5

    SHA256

    a049cac5548c3c5e4fcf6100c888b14482f07bb5069b12a3c0444864ac3d7672

    SHA512

    e390089b52cac719b9ec79102bbacb13564f91cba4e511e838d7a0f601448bbc0ee8cd2732b866c1062bef2c625ba73526ee494b2879db01529b632dbd3f354f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\a[1].gif

    Filesize

    43B

    MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

    SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

    SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

    SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

  • C:\Users\Admin\AppData\Local\Temp\Cab50DF.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar5120.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\Tar524F.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7XS7EA89.txt

    Filesize

    602B

    MD5

    ebc0a50feb0829423334e559d99d43ba

    SHA1

    53b8f8650b6f9b0a71edf9b812474cbdb4be2fea

    SHA256

    8b924e3ee7641bf6d617a9d663dbb9a778866ad2e1710fdd0a84319d12b14d5f

    SHA512

    378e58289027d7816fc7e5e1561a9044c56f2f340bd0dd598cf7b72d9d763542f3c6ac67b2052a225e399f5b516791fd48673c7668d2b5fe6f1e10d2318fdd6b

  • memory/340-78-0x0000000000E80000-0x0000000000E82000-memory.dmp

    Filesize

    8KB

  • memory/1404-77-0x0000000002BA0000-0x0000000002BB0000-memory.dmp

    Filesize

    64KB