Resubmissions

01/04/2023, 05:43

230401-ge1rcsgc39 8

01/04/2023, 05:42

230401-gejg3sgc36 7

01/04/2023, 04:26

230401-e2jegsfh69 8

01/04/2023, 02:49

230401-dbh6csgh41 8

01/04/2023, 02:31

230401-czqdxagg7v 8

01/04/2023, 02:27

230401-cxvwlsfd87 8

Analysis

  • max time kernel
    215s
  • max time network
    223s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/04/2023, 02:31

General

  • Target

    drfone_setup_full3824 (1).exe

  • Size

    2.2MB

  • MD5

    ee06eafbe8972c749a5161e54d3fdcd6

  • SHA1

    80f4197cf15c36acaf37a1ab8159ec4ab2368c26

  • SHA256

    e5e57cc01f94cd129db4fd88860253c0936cb2612a734cb176924ddfa3ffb862

  • SHA512

    116c7274a1adc3274c046dfdeaf8b187ec31d42dd523522e372b3ce05aada949c4a56856a4cf9c2dfaa2571c5ec62a7629e476d72e8259fa854cfa921b4f83c9

  • SSDEEP

    49152:suI4s4xwYeRQXEEpusP5uKKNeEzo/I/P5jaYRTkTun99ZS6Y0fxfNrBFS:b2Q30rNeEzoiP5ja0397Sb0fxfNrfS

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Public\Documents\Wondershare\NFWCHK.exe
      C:\Users\Public\Documents\Wondershare\NFWCHK.exe
      2⤵
      • Executes dropped EXE
      PID:2640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Wondershare\WAE\wsWAE.log

    Filesize

    2KB

    MD5

    f7bf532f800db6b38b585a42ce3b2c3c

    SHA1

    a7624e878bc1c433014c7f6d4dd32bee8f0af1c0

    SHA256

    4793db3be7facec35587d2bf734f39a87843c6bf0a123bf682ad63860a6a9a8d

    SHA512

    0408c5d58e525fca8296c12a238ad396a50f2c1c39c725c314f5be0f7c4a3e61f65ee08180abc98e611fe2b43f49fc2ffb027e22e297483535d6e8fb6649308e

  • C:\Users\Admin\AppData\Local\Temp\Wondershare\WAE\wsWAE.log

    Filesize

    4KB

    MD5

    c0bdd78dcd79bc7b4f1626f71d320d16

    SHA1

    83b6a3c4d78d5259173fdeb7e44d7912dd0b5f73

    SHA256

    c92eff7d2314d746c28cd9b0a329270d305275c00c9d59ec0dd7a83f333dd69b

    SHA512

    5a405067b2e17d04a762837495b6a2e8b9fccd95229e465a56a61495b2f62a78c7b6172795d014373e94cc22095c18d6434ac19b74a4ae103706585885f38e44

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    7KB

    MD5

    3af5bec82deaa0bdd37b7dbb75e315e9

    SHA1

    1bba997bb51504950eb9202566c235462cb6d9c4

    SHA256

    f29c994e84b5aafff975436f930efa4d70f54c272752d18022d392c19c3333b3

    SHA512

    9855d362bfb8078d26cc80b539395f41090412ed17dc152fcdd39710a49d9d7ac9cee5c7b62235d9f74936b6eb7582390339fdb562550a455ee23e42310c6474

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    1KB

    MD5

    61f99bcf10ae6d69b8954c856d80db69

    SHA1

    923513543f145e2bd62dcab20f343ddc619156da

    SHA256

    0ae8eaa718544221acf630d2f63817e6ccf2a8137b8f4094674efc32016d1386

    SHA512

    19366556d40c253c7045c44a23ffc31954eba719bb1a8ca4ea2ca979fc750003afa931285ed640896675aa5349b6b33415a2a276a407d170e2d88a9d8bf5db87

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    2KB

    MD5

    612ee692e601d693672762fa4b33b0fc

    SHA1

    6610912078743e23b72b72578629e3aff6ab4d48

    SHA256

    95b592aa3469f3d9d0d8469a10583b5155e2e3b9988196ccf3363265920abbbc

    SHA512

    73bc1c75c5d8711440080c6dda80309a56ce9258f4c97505bd8241d53a421ca4bc9ae916986e46c2effb885fc59d3ce8a41e99e0148de59f567fd5e16e1abb00

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe.config

    Filesize

    229B

    MD5

    ad0967a0ab95aa7d71b3dc92b71b8f7a

    SHA1

    ed63f517e32094c07a2c5b664ed1cab412233ab5

    SHA256

    9c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc

    SHA512

    85766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b

  • \Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • memory/2640-1128-0x00000000001C0000-0x00000000001C8000-memory.dmp

    Filesize

    32KB

  • memory/2640-1130-0x0000000002050000-0x00000000020D0000-memory.dmp

    Filesize

    512KB