Resubmissions

01-04-2023 05:43

230401-ge1rcsgc39 8

01-04-2023 05:42

230401-gejg3sgc36 7

01-04-2023 04:26

230401-e2jegsfh69 8

01-04-2023 02:49

230401-dbh6csgh41 8

01-04-2023 02:31

230401-czqdxagg7v 8

01-04-2023 02:27

230401-cxvwlsfd87 8

Analysis

  • max time kernel
    900s
  • max time network
    869s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-04-2023 04:26

General

  • Target

    drfone_setup_full3824 (1).exe

  • Size

    2.2MB

  • MD5

    ee06eafbe8972c749a5161e54d3fdcd6

  • SHA1

    80f4197cf15c36acaf37a1ab8159ec4ab2368c26

  • SHA256

    e5e57cc01f94cd129db4fd88860253c0936cb2612a734cb176924ddfa3ffb862

  • SHA512

    116c7274a1adc3274c046dfdeaf8b187ec31d42dd523522e372b3ce05aada949c4a56856a4cf9c2dfaa2571c5ec62a7629e476d72e8259fa854cfa921b4f83c9

  • SSDEEP

    49152:suI4s4xwYeRQXEEpusP5uKKNeEzo/I/P5jaYRTkTun99ZS6Y0fxfNrBFS:b2Q30rNeEzoiP5ja0397Sb0fxfNrfS

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\drfone_setup_full3824 (1).exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Users\Public\Documents\Wondershare\NFWCHK.exe
      C:\Users\Public\Documents\Wondershare\NFWCHK.exe
      2⤵
      • Executes dropped EXE
      PID:5020
    • C:\Users\Public\Documents\Wondershare\drfone_full3824.exe
      "C:\Users\Public\Documents\Wondershare\drfone_full3824.exe" /VERYSILENT /NOPAGE /LANG=ENG /LOG="C:\Users\Admin\AppData\Local\Temp\WAE-drfone.log" /installpath: "C:\Program Files (x86)\Wondershare\drfone\" /DIR="C:\Program Files (x86)\Wondershare\drfone\" /WAEWIN=701E0 /PID=3824
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\is-EQR5S.tmp\drfone_full3824.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-EQR5S.tmp\drfone_full3824.tmp" /SL5="$60086,309495938,673280,C:\Users\Public\Documents\Wondershare\drfone_full3824.exe" /VERYSILENT /NOPAGE /LANG=ENG /LOG="C:\Users\Admin\AppData\Local\Temp\WAE-drfone.log" /installpath: "C:\Program Files (x86)\Wondershare\drfone\" /DIR="C:\Program Files (x86)\Wondershare\drfone\" /WAEWIN=701E0 /PID=3824
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\ProcessKiller.exe
          "C:\Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\ProcessKiller.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Wondershare\WAE\wsWAE.log

    Filesize

    496B

    MD5

    509e932827303c8ebd638c30f0f5d5ff

    SHA1

    c39ec86363128ae1bd9f33b5fe8c3db9eaf5db27

    SHA256

    a0d6c4eda14672c322cf1749159c4092b54c139c3e9da9db1c6e0be6547a1171

    SHA512

    b62b52dd3a1c7753e96bb4acba37354b6e28afeed9810de5340c782f4a6a1781d1ea93479542380e698e668f3147cf5431cac41e1954ce849032e0864b4ba676

  • C:\Users\Admin\AppData\Local\Temp\Wondershare\WAE\wsWAE.log

    Filesize

    5KB

    MD5

    918d3b8bea30ac1ebba94818995477da

    SHA1

    4c53efdb2cfbc660717690f4f89aa6eccd3148c1

    SHA256

    2d294c9a5dfa798bc765c2f1e87fcb6ed68741a532281178b68179e8398b207f

    SHA512

    0152aeaf1b946ec62281762b2fd9952bf1841358d0a1641f0396ee7c6e5a1a1b197b11ec49cf2fe4a1772a31b3086f67d1143927e5106f81fa79a23c171aa5da

  • C:\Users\Admin\AppData\Local\Temp\is-EQR5S.tmp\drfone_full3824.tmp

    Filesize

    1.7MB

    MD5

    192369ebd80fb01ccfc585d8043bf733

    SHA1

    3d77774e3159cd0c277e5bb6b68493df2eeaf038

    SHA256

    b8828f657fe052ddce0db320d08e619e316eaf3853d09272f1a5c7bd850ac8f3

    SHA512

    042c1710d8330449086e7e1ff952d2102e07985628cf4f1e96de25a62045038e6381d8ea1ce5ef43c31e265fc04a9553c67b1864f487d271e620c0c509d80ea2

  • C:\Users\Admin\AppData\Local\Temp\is-EQR5S.tmp\drfone_full3824.tmp

    Filesize

    1.7MB

    MD5

    192369ebd80fb01ccfc585d8043bf733

    SHA1

    3d77774e3159cd0c277e5bb6b68493df2eeaf038

    SHA256

    b8828f657fe052ddce0db320d08e619e316eaf3853d09272f1a5c7bd850ac8f3

    SHA512

    042c1710d8330449086e7e1ff952d2102e07985628cf4f1e96de25a62045038e6381d8ea1ce5ef43c31e265fc04a9553c67b1864f487d271e620c0c509d80ea2

  • C:\Users\Admin\AppData\Local\Temp\is-EQR5S.tmp\drfone_full3824.tmp

    Filesize

    1.7MB

    MD5

    192369ebd80fb01ccfc585d8043bf733

    SHA1

    3d77774e3159cd0c277e5bb6b68493df2eeaf038

    SHA256

    b8828f657fe052ddce0db320d08e619e316eaf3853d09272f1a5c7bd850ac8f3

    SHA512

    042c1710d8330449086e7e1ff952d2102e07985628cf4f1e96de25a62045038e6381d8ea1ce5ef43c31e265fc04a9553c67b1864f487d271e620c0c509d80ea2

  • C:\Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\Customization.xml

    Filesize

    102KB

    MD5

    482ffbac9483f0e49537026160beb28d

    SHA1

    cf70b8e7982abf823a6792e14c4c49b4d7e20f95

    SHA256

    98ddf774d0b890965410326670b1a9797bc85aeb24fb4ebfe0286ceca3ff8122

    SHA512

    cf20a41e94281374a91bf92c281152a12234763a8cca01d94eac46a0c55c6a70416700a0108306a7d98a71808839918d5919bebd75620b526dddc73cdcd907dd

  • C:\Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\ProcessKiller.exe

    Filesize

    10KB

    MD5

    50e2db9f1096b0c80873ee6341a4fbc2

    SHA1

    1d3d506314796d480bdf6a9de99246960cbc7b3f

    SHA256

    708bc1ab44f30a8a96c769acbea936a9bd9758523252a6c71da0e3ed0c678390

    SHA512

    1de5ddf3750fab23c9d026cb3b8b1fbe481da1d37f1bbb7ae9ed7cc724d8dfd728f16700529259a48fd5db6a1533615bd58d7034d856a09edea3082bcef541c7

  • C:\Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\ProcessKiller.exe

    Filesize

    10KB

    MD5

    50e2db9f1096b0c80873ee6341a4fbc2

    SHA1

    1d3d506314796d480bdf6a9de99246960cbc7b3f

    SHA256

    708bc1ab44f30a8a96c769acbea936a9bd9758523252a6c71da0e3ed0c678390

    SHA512

    1de5ddf3750fab23c9d026cb3b8b1fbe481da1d37f1bbb7ae9ed7cc724d8dfd728f16700529259a48fd5db6a1533615bd58d7034d856a09edea3082bcef541c7

  • C:\Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\ProcessKiller.exe.config

    Filesize

    580B

    MD5

    aa08c8fa940b0850cd84af85278351d7

    SHA1

    00c117b369f86c9d4f18d54c4dda460c63d4c173

    SHA256

    569218463823b1d489f51b76993cbe77aa61be7fe3b1e567f2bf1760af014bbe

    SHA512

    84071521004cca1eca0a33739723a0210a11e08446f405b8215d4974d647abb7a5f25f4f6fdbcededa8515703aeda753eba995e37c2ca4094dba2eb334b0d2cf

  • C:\Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\is-S7SHH.tmp

    Filesize

    10KB

    MD5

    50e2db9f1096b0c80873ee6341a4fbc2

    SHA1

    1d3d506314796d480bdf6a9de99246960cbc7b3f

    SHA256

    708bc1ab44f30a8a96c769acbea936a9bd9758523252a6c71da0e3ed0c678390

    SHA512

    1de5ddf3750fab23c9d026cb3b8b1fbe481da1d37f1bbb7ae9ed7cc724d8dfd728f16700529259a48fd5db6a1533615bd58d7034d856a09edea3082bcef541c7

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    677B

    MD5

    f20d451ea717c2eeeeede4d8dc75be9a

    SHA1

    bf6c92c4b637c2b298934885448082b66a26d318

    SHA256

    2ac53665c862d4d77b31e4eedbfedd77cf37550be4bf56dc0ebd354a51f9b007

    SHA512

    791e959235bb75278b97bd20648821efb66c0c52e7f7294523810cceec1063cfa1c213c2a2e1b8e0219453062e127fd447f7bb2d81f8617634fd1928ad769cd0

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    4KB

    MD5

    cef280f606574d1086a2d172896d05e5

    SHA1

    45d2b3917f630e0c94aa996b6faee17592306d7c

    SHA256

    a76d5177134778e09492b4669f911c44dd1f7169321a48fe45643b529161336b

    SHA512

    b78521787e25fd21d897efd044278f945d2110727102c61abb30f300ce37f372e9bb54348bd0d800b419ecc4afbfe88fc7d89a028de0bada0a35d62abbcb23ee

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    5KB

    MD5

    905a5562c6abe14344e0fd49d34f1d4a

    SHA1

    829d32dcc7c702dfdd27d5cfe926d7a9153aa6dd

    SHA256

    086cc81ca0f05520f0d9ca63c538a18b414c8b2377804e142b59feb22c4eb731

    SHA512

    7c49608db50fa49a7438accf878530d578c19589ca360ea6bec03f236da022639874a7fb33628da23df9e185c32a281cfbb67e419225ac98d783db0687181505

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe.config

    Filesize

    229B

    MD5

    ad0967a0ab95aa7d71b3dc92b71b8f7a

    SHA1

    ed63f517e32094c07a2c5b664ed1cab412233ab5

    SHA256

    9c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc

    SHA512

    85766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b

  • C:\Users\Public\Documents\Wondershare\drfone_full3824.exe

    Filesize

    296.3MB

    MD5

    81305532cb0c94e23bc23cd8f7074861

    SHA1

    f867ebdd38e12f217465df852af9d461a74256c6

    SHA256

    2debe80b3688b2a2645b99b746688989eb2814f3aeaa0339d8706ac6f5a9d195

    SHA512

    f3e5deb524d79b6bb237acefac3d1fbfe43a00abbc6aa4455a9c5b0002136379fa411b8851a3df2bfe9c2a6d358bdd4fed890823ab8c8b79412993b3e11d9ea0

  • C:\Users\Public\Documents\Wondershare\drfone_full3824.exe

    Filesize

    296.3MB

    MD5

    81305532cb0c94e23bc23cd8f7074861

    SHA1

    f867ebdd38e12f217465df852af9d461a74256c6

    SHA256

    2debe80b3688b2a2645b99b746688989eb2814f3aeaa0339d8706ac6f5a9d195

    SHA512

    f3e5deb524d79b6bb237acefac3d1fbfe43a00abbc6aa4455a9c5b0002136379fa411b8851a3df2bfe9c2a6d358bdd4fed890823ab8c8b79412993b3e11d9ea0

  • C:\Users\Public\Documents\Wondershare\drfone_full3824.exe.~P2S

    Filesize

    296.3MB

    MD5

    81305532cb0c94e23bc23cd8f7074861

    SHA1

    f867ebdd38e12f217465df852af9d461a74256c6

    SHA256

    2debe80b3688b2a2645b99b746688989eb2814f3aeaa0339d8706ac6f5a9d195

    SHA512

    f3e5deb524d79b6bb237acefac3d1fbfe43a00abbc6aa4455a9c5b0002136379fa411b8851a3df2bfe9c2a6d358bdd4fed890823ab8c8b79412993b3e11d9ea0

  • \Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\UpdateIcon.dll

    Filesize

    45KB

    MD5

    2aa5d7ac4c9fc121934dec64da362af0

    SHA1

    b37ecc61d70d536779fec87d5c482a9fe4a71e3c

    SHA256

    9c7b3dbd9dc03b59bdbeaf21649d9de7ccb909f50054244315e54f92e14f6612

    SHA512

    3f366f2981d764ef7e19e2e99a1d8e80a2558c650573d4f5f9f633920d3726cae741892a01400e19e9d7716941c29fa51860cacbcbde6b359aecfb2ffe1d1f62

  • \Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\UpdateIcon.dll

    Filesize

    45KB

    MD5

    2aa5d7ac4c9fc121934dec64da362af0

    SHA1

    b37ecc61d70d536779fec87d5c482a9fe4a71e3c

    SHA256

    9c7b3dbd9dc03b59bdbeaf21649d9de7ccb909f50054244315e54f92e14f6612

    SHA512

    3f366f2981d764ef7e19e2e99a1d8e80a2558c650573d4f5f9f633920d3726cae741892a01400e19e9d7716941c29fa51860cacbcbde6b359aecfb2ffe1d1f62

  • \Users\Admin\AppData\Local\Temp\is-JV9OU.tmp\WSUtilities.dll

    Filesize

    188KB

    MD5

    a0cefe160f504402b5148580c5b912bf

    SHA1

    3b6c9641a7b2edff1b60bd55b8eeb7c34eab8aee

    SHA256

    4333dae45b166e2ec59c49a46ff6abe3342d9191ebafda9b53803e639e33f1d1

    SHA512

    a9e9fff977c3e365caf0a5351b07319502a22f6ddf34267e9d77b171dbdce82d6cfb6bb49b7ba4b5c6966d97c3630ff2944a96f32c26819e43ed85b4f15f862d

  • memory/1772-2460-0x0000000000150000-0x0000000000158000-memory.dmp

    Filesize

    32KB

  • memory/1772-2461-0x00000000048D0000-0x00000000048F2000-memory.dmp

    Filesize

    136KB

  • memory/1772-2462-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/2616-2512-0x0000000000400000-0x00000000005B4000-memory.dmp

    Filesize

    1.7MB

  • memory/2616-2414-0x0000000000400000-0x00000000005B4000-memory.dmp

    Filesize

    1.7MB

  • memory/2616-2415-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/2616-2416-0x0000000000400000-0x00000000005B4000-memory.dmp

    Filesize

    1.7MB

  • memory/2616-2513-0x0000000006D60000-0x0000000006D6E000-memory.dmp

    Filesize

    56KB

  • memory/2616-2423-0x0000000000400000-0x00000000005B4000-memory.dmp

    Filesize

    1.7MB

  • memory/2616-2559-0x0000000000400000-0x00000000005B4000-memory.dmp

    Filesize

    1.7MB

  • memory/2616-2493-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/2616-2468-0x0000000006D60000-0x0000000006D6E000-memory.dmp

    Filesize

    56KB

  • memory/2616-2459-0x0000000000400000-0x00000000005B4000-memory.dmp

    Filesize

    1.7MB

  • memory/2680-2420-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/2680-2405-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/2680-2411-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/5020-1205-0x000000001C490000-0x000000001C4D9000-memory.dmp

    Filesize

    292KB

  • memory/5020-1204-0x000000001BCF0000-0x000000001BFFE000-memory.dmp

    Filesize

    3.1MB

  • memory/5020-1206-0x000000001C550000-0x000000001C5B2000-memory.dmp

    Filesize

    392KB

  • memory/5020-1203-0x0000000002FF0000-0x0000000003000000-memory.dmp

    Filesize

    64KB

  • memory/5020-1202-0x000000001BCD0000-0x000000001BCF0000-memory.dmp

    Filesize

    128KB

  • memory/5020-1201-0x000000001BC90000-0x000000001BCA8000-memory.dmp

    Filesize

    96KB

  • memory/5020-1200-0x000000001BC40000-0x000000001BC64000-memory.dmp

    Filesize

    144KB

  • memory/5020-1199-0x0000000000E80000-0x0000000000E88000-memory.dmp

    Filesize

    32KB

  • memory/5020-1207-0x000000001CA90000-0x000000001CF5E000-memory.dmp

    Filesize

    4.8MB

  • memory/5020-1208-0x000000001D000000-0x000000001D09C000-memory.dmp

    Filesize

    624KB

  • memory/5020-1209-0x000000001C410000-0x000000001C418000-memory.dmp

    Filesize

    32KB

  • memory/5020-1210-0x000000001D4C0000-0x000000001D4FE000-memory.dmp

    Filesize

    248KB