Resubmissions

01/04/2023, 05:43

230401-ge1rcsgc39 8

01/04/2023, 05:42

230401-gejg3sgc36 7

01/04/2023, 04:26

230401-e2jegsfh69 8

01/04/2023, 02:49

230401-dbh6csgh41 8

01/04/2023, 02:31

230401-czqdxagg7v 8

01/04/2023, 02:27

230401-cxvwlsfd87 8

Analysis

  • max time kernel
    1191s
  • max time network
    1203s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/04/2023, 02:49

General

  • Target

    drfone_setup_full3824 (1).exe

  • Size

    2.2MB

  • MD5

    ee06eafbe8972c749a5161e54d3fdcd6

  • SHA1

    80f4197cf15c36acaf37a1ab8159ec4ab2368c26

  • SHA256

    e5e57cc01f94cd129db4fd88860253c0936cb2612a734cb176924ddfa3ffb862

  • SHA512

    116c7274a1adc3274c046dfdeaf8b187ec31d42dd523522e372b3ce05aada949c4a56856a4cf9c2dfaa2571c5ec62a7629e476d72e8259fa854cfa921b4f83c9

  • SSDEEP

    49152:suI4s4xwYeRQXEEpusP5uKKNeEzo/I/P5jaYRTkTun99ZS6Y0fxfNrBFS:b2Q30rNeEzoiP5ja0397Sb0fxfNrfS

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Public\Documents\Wondershare\NFWCHK.exe
      C:\Users\Public\Documents\Wondershare\NFWCHK.exe
      2⤵
      • Executes dropped EXE
      PID:2688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Wondershare\WAE\wsWAE.log

    Filesize

    2KB

    MD5

    24f07b4bc9688ce195258c3777239244

    SHA1

    59b6e47ba01c4ce0698adf88e30a632444bb2fe1

    SHA256

    00dcf836a18e7b5d7b806a2ed96dbac931070f44c5711c18ad686285726ea985

    SHA512

    24cbf741982b54df25f66c5f6ae026010e631c4750e16c442ff411b7fd164a1da5acca64c655331e22dbdfcfb3cd99f089043f22f8da101d44cc2e1ed2910701

  • C:\Users\Admin\AppData\Local\Temp\Wondershare\WAE\wsWAE.log

    Filesize

    4KB

    MD5

    b166d4057cbabe3d01937cd988963e61

    SHA1

    e24c69780b01be05dcf8010eb1222d483ac163f3

    SHA256

    c7e8c1705af828d68dfb833c15f3619608ffb8e4f38f579427840c050fc20fa7

    SHA512

    0439c011896aecc478b314c5e93d0db1b300554dd2c614790f413ea611ae53db5194ce48c6639d26b5cdf3a8e691e901c68c7fedca7609d24ace9b4822a1e821

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    4KB

    MD5

    e3e4139f860a51d596e1edc262a388ac

    SHA1

    62a001a8fc75ec2785d70ddb7c8676d753b33ff0

    SHA256

    b76a0870e52202860146b51da9d91ec224ce137fae3737a2e88275dab6d825d4

    SHA512

    a2d24a4ae9708c8995d3d98558e72db945f6eddc25f9fbb26b7d77fb73c141972862d4bd984565ea9a3d7d9770f452af5652297e0a18a49654f5b61491405a5f

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    4KB

    MD5

    e3e4139f860a51d596e1edc262a388ac

    SHA1

    62a001a8fc75ec2785d70ddb7c8676d753b33ff0

    SHA256

    b76a0870e52202860146b51da9d91ec224ce137fae3737a2e88275dab6d825d4

    SHA512

    a2d24a4ae9708c8995d3d98558e72db945f6eddc25f9fbb26b7d77fb73c141972862d4bd984565ea9a3d7d9770f452af5652297e0a18a49654f5b61491405a5f

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    3KB

    MD5

    3cebbd6ed95177d36816eb42745470c6

    SHA1

    37f5739e8187d43bbf601d8e857d9aafda2a6179

    SHA256

    6088dc7ab9debb76c6fbf6c6c6b663d764f359a4409fa32d9f04d0acbd2d0c3b

    SHA512

    ccaad6d3e04c0ac2e8ae646a459a8a46c82d4c29b292c25092bf1c9b10b4e6fb404cbc9c0328f58751e82302f9c0fc784e494c569d3838490689fddbf85f70b4

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe.config

    Filesize

    229B

    MD5

    ad0967a0ab95aa7d71b3dc92b71b8f7a

    SHA1

    ed63f517e32094c07a2c5b664ed1cab412233ab5

    SHA256

    9c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc

    SHA512

    85766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b

  • \Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • memory/2688-1128-0x0000000000430000-0x00000000004B0000-memory.dmp

    Filesize

    512KB

  • memory/2688-1129-0x0000000001120000-0x0000000001128000-memory.dmp

    Filesize

    32KB