Analysis

  • max time kernel
    124s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 08:01

General

  • Target

    f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe

  • Size

    135KB

  • MD5

    511aa2f2fe6196e032ec7fef83bb8d95

  • SHA1

    ce874f517d335a1e1ab0df99111df1d3adbc0d21

  • SHA256

    f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150

  • SHA512

    78a4771ab5e531420a45338ae27a5a4dad11b50385964a739e7ecec2c55d3ee47cde148dfc1e82ce7e8b8eb8a04a7f9b784cdd640e490a84bc8ce621d2f8d1c0

  • SSDEEP

    3072:VV2vxw88jLtbMmJ2RqRADLK1iJ1/NvdOgecZlw/C:VV2v503kRqRuL0iJ1FdLec9

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Deletes itself 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe
    "C:\Users\Admin\AppData\Local\Temp\f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_HELP_instructions.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2044
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\f2c9ae3735430b930a81148c0bb470fcb733e456a2a942f859a1b59c4a7b2150.exe"
      2⤵
      • Deletes itself
      PID:112
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1568

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\_4_HELP_instructions.html
    Filesize

    9KB

    MD5

    a83f2575adb73154d1f09ba4434b4d48

    SHA1

    6b270234584cec1d081f5fc736c5ec67bef080da

    SHA256

    24df403992311d83523674db143a9d6be1dc51ccb205a6569f3d40e5f66d3219

    SHA512

    fe301b106900c27bec6ce1a51b5c2b01afbcf8938289b0b89407a9450d9d6128ca569ea4127f01e8798f25631434488ae07f7cd55cc7b0b0b1a3e0ae18ceaa66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1c1950c80fd9306ac09f0fe2018bfbcb

    SHA1

    20a707db8f35ca610bc2e1b8467917b6a56d146e

    SHA256

    8e2d541ba9e3123c7a88ca5cf079bf2541cda6acbaa0532f55411b7727f9a1f1

    SHA512

    86a1a9e24be3da6766af1475d3e07a8cb2639123ced2621b0faa0fda125e49801d28890f65b64e5b6335c154bf5e0baee8626ef87a75b1241fc4ddf84d045628

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d0d31ba0f7bada634bed0a581bcd2280

    SHA1

    0d168587e31464a932bcb1c4204f6ede91459d71

    SHA256

    6b8c2ac25a8b0b6cb29f7fbf7076baba8e83d0fe8340403e86d62149f8263be8

    SHA512

    5a305f65c6c5ce058f80fb457fc67f18a4d62a91203621df77bdf058cde549eddb7c93f41de39951a3fab737da262407114b4bd6a68d1837b39320bf5cf9f22b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d28e54c9f46375b4a339ecf12ab5918e

    SHA1

    f6705ec3a4a2c2cfbb759b0c0c86bd1b49955a13

    SHA256

    2e910b175ba9c21b0b67843d57c6967fed7f2c9dcc61170bfb416b785841abd8

    SHA512

    8677374abec0626e279224f4101335d46742989d3106c07616cf4a290b68347b6c551399eceab8ea02f400923778708b883648c5037cc98a4d8e3babbb957de3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a9fe2e0de72dc425f13026c1651c8332

    SHA1

    5724104ece035448008c1c3baa24f4c0a10da83d

    SHA256

    e4d813e22607352d8b109e1e39c64c7cb78acced9296734a322692b241aadfe0

    SHA512

    55c296ae1f539b6e67f6d0bd87757202191eb7d9a511da1262525aef17fc5196bee25e050da717eadf4e2b85f2dda203bace70ee3be40b32edb7e96b137158a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    45ac7b04342d2aa2720085c3ef1284b1

    SHA1

    8e11c44c62cc1673d25695831ad5bcfdc9004601

    SHA256

    1935c5a5c6caeae10798fbe1ecc84e6954080de4731188d27e330f9eb3ba657d

    SHA512

    c0ae384f4ea844243e4986f99301519081aa6c56e1afe2fbf5a6cc41045cae9a4d5e7254158af37c8176aa4e303270373140e1d2a7a642424598c335a4cf6882

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    612fcd2508174e05b6f14c605658a2e3

    SHA1

    ceddc2a0f7a24bdaea5d91ec423f0ce28ea3b1be

    SHA256

    03a8d9180ff6558136334a8f08a8a84f1eae48d6c0b5af58e0e46bf6fdb876a1

    SHA512

    8bd225362ef03e17f526bb47af6af78a7fca9f8c2bcb09b5be4065c647121565d24cf26ecacf66870c94793b60c47e3bf90506c10df9f1eb7fc495e779a429ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    26b4970269a464d878559adbd5baf4cd

    SHA1

    a6c1854b6d0c7d041c0bbf8e9525aaf9c112de7e

    SHA256

    f079ca01d4995419ae2a041acddaf37725972fdd40093947997cad9513443956

    SHA512

    15fd9d35b00c88bd0b5551b80830fdbdd88e5b9a590873dd70f8d8abbc3c51ddc2900dbed6e8429dbd5224609cc634b6707afa7e9dea1b5fd0d0f3ccfe598308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3b063b6102c29eafef0e84a9dc9138a1

    SHA1

    dc4c6cc117051bea738a1d11df450e9ac5924243

    SHA256

    d84f591e04a41f8f4bb4cb4cdd9a7fecd574bb0d947a33b0b21d137e25b8c584

    SHA512

    4eddda2642930f0e99a601b0ada0ae26d4be5711af081df245154979274415c3f8909813025cddd297223fb992acb1c0b833c88805d2b424b5d7dc648f34baf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    219d181ab9a5c587ceddeefbcf962c1b

    SHA1

    7fcd3fd0d3d5b05f195e75e7b30ecfd34ef66a84

    SHA256

    e7d6624969671a938cd7974ff33d6cde722ebcd3833b76fb34938a608768c5d4

    SHA512

    2c83ef96acfd536bdd5305926c2641e21f814bbe6747075c81aa2b7504d2b5e641a98c7d14ab36b62adadec9122490f1bdc31e0831a04f3c659b8e8c47d92ce6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bb16cdc4e71a08eb2ffa5dd3ac029edc

    SHA1

    b32052ac691922e307f58fab6afc0ae86d284ea0

    SHA256

    25d4b173496a6d700800cf9a366e16688f12c248af729b82f9130a7e901dba84

    SHA512

    3434d138504bbdcc2d67bd16f3ca50a52897f6532b7867dab936274a39f81ac7ef9387e7e35fa539e762a825c50f41a6dec1d921655fe827a5491abecd538396

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bd967ae4d628f987a141c9616cd0acd3

    SHA1

    4b1d9d971e0c0e3fe9bd94bdedc5d649c41a78c5

    SHA256

    d3719a5bae603687d05e6a67a42d1d3ba805472ad664ea5642ad9e15f20c55e8

    SHA512

    9d439f8dcce7f86601be6fe35936d99807666d2b1d4b05cc9dd81588f5ef0ac561c1eeba72526648ae9c9c2576cab47f64f45d408c2b23dd830e1edc1ac162af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    701b9750270d71336efb41dd425a4aec

    SHA1

    25ec8fef55bb5485b27d163f4146359bb28c5a9a

    SHA256

    027b2d90ec39f2608066c6e3a505fafb4d008aed63268a0d638ca85cc773c870

    SHA512

    f75c2bc05211d04c253a453b0a6cbb75337916b453b4e100ae0c03341a4a95609da96ec848374c5596971c0f11b46c108ff01e4c72a994f09dc61009b827f83c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0fdbb8cd1af845122692e41d76d0edf3

    SHA1

    88b90bb3d8872360b6afd2a1ef072e46fba43068

    SHA256

    c18401cd18b27f7f37b96bdc68f77d746cceddcb4a17f9e54880272f08819361

    SHA512

    0ffdf582d4546941c0e6091d660d2cc478469b6058c1dfbdee3454fc84f922b51290a278f82b0a10eb3851166a761fadc2e098f1d3bbee1fd06b407a1683c3e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9ff356c380aba5d89ce24337be20c193

    SHA1

    c728f8134c7be87462f5f553fc3533fe935737c3

    SHA256

    b35a8c5a6db094504cd1d6b8c19f217c1497aa272d9c2582538d0b5fb98dbc20

    SHA512

    9164e0652c69bc9a8106e9d8f4aef1f2480598c0390fa08247b85e7e91403187aebaa12c101d9bb6c760ece369476ab91c02251e06c4697208790e9c161e93d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4331371d1aba8c2698afb2bbec1bf032

    SHA1

    41adfe41308cc073790b90718b9547524972bba9

    SHA256

    748d18165268fc979e78e6267b4e5cb4d8acc75a81ec41ed4c294d1cd42121cd

    SHA512

    632dfaa5f5e7d6782aa26fc441bb9d6b75d52bb18bef16548cc7c1382000761a7cca1392b991ba4baaea707a0296df458763b836cebca0b95027d45b1e56f315

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    523b3b6fb9f5dcfa1279489049365205

    SHA1

    f8b79096400f70e1238b4b9ffb935ab17028cc25

    SHA256

    60819b5e011c4f7898fa2491c557a05105af0da5d57c6fab7f369a910c82c19f

    SHA512

    d0fe1edc1a105050bd40ed0ebed4750bcd1af71cfca26d39a85ce89a8dc7a3a0bee215b29cbd6b4c41c293b5a8941f2f10ab604d90a1cb889e1593ce096e3981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5b7e063880e1452f3a79637ff06b1822

    SHA1

    6473d50a865a33ec6f578f32f96a9d8b9e32691d

    SHA256

    e8ec290210f07c73f21ae3bfd1fd89af915bfd93e5d2d832ddf7960d8f7eea70

    SHA512

    ebe82acc80aea7a273f9b15fa861afa306b6404374ad9257316add6d9b2394cfa4f8fc08d384c646e2f0bd04ac05ff8c48f012fe96e863b572f2b0c8c85fe62b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b2f23e8ec6cef49407dc2b1a89b3d8eb

    SHA1

    e2deba55292f76b57bce82c96b661e08d710c415

    SHA256

    da0686eaa8d5dd44faca9697cfb9e1335d5e2d5e886abb9b4c5ab2fd94e76b28

    SHA512

    3df85c2590f8b37913538f7ab61b03b2d993be0f190447534e74771764566968efed47a7257353fa4ffc89605c708df1d962979ad7038dccd4fd86bb3a71a464

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f699a62e2aec361f89aa177c2decb764

    SHA1

    163fc0a1a7a4df79401344d1f868cb880b7aa492

    SHA256

    67beac093390f809a3022fcf6e99f3e46db309da1dd34a18043df4942fc63e4c

    SHA512

    42cc0de7629358ed8c95c65d5ef1cc7ea97a3741a6bdbb1c8eadb3c954a534b31f531549be7e72cd327bfb3947afe655e6452d3fa9db3b25ddf7140788bf807d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3d9169609ae8b310ed75c6eea39d071d

    SHA1

    6518d963180b507dafb2922479d9218f658fe9fa

    SHA256

    03f3c5b79f39631db14f4a3994ee4ccfa5825bbbe87c9c25682683b42d1a2df4

    SHA512

    d7c52786aac56a1affad331db2863296e131c65d17c7ebaa2f8b6b1b909ce2d9eca41e1a30a2a73babc6d4b10ec4752fdabfa1ad864083865f570a0a9c9aeee6

  • C:\Users\Admin\AppData\Local\Temp\Cab40AB.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar41DB.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\Desktop\_HELP_instructions.bmp
    Filesize

    3.7MB

    MD5

    4865be2d565b21533c98425cbb3ce142

    SHA1

    8a99dbec293b32294f544bef9be2e8ca2ecbff81

    SHA256

    8b692b7b4b0c03b4f6626ca972ce58bfb06e550523e6b8e173df7e7c8bc8518a

    SHA512

    86967e184c4db6af422c25e7d829a3f1549f3eedb737b24c9881c3b95b8c55e1a8d59e8754998aca8c934220dfb56b28845e77dc2d5a4eb83c8cd23a6adb9240

  • memory/1568-276-0x0000000000170000-0x0000000000172000-memory.dmp
    Filesize

    8KB

  • memory/1568-756-0x0000000000360000-0x0000000000361000-memory.dmp
    Filesize

    4KB

  • memory/1568-279-0x0000000000360000-0x0000000000361000-memory.dmp
    Filesize

    4KB

  • memory/2144-10-0x0000000000160000-0x0000000000186000-memory.dmp
    Filesize

    152KB

  • memory/2144-0-0x0000000000160000-0x0000000000186000-memory.dmp
    Filesize

    152KB

  • memory/2144-9-0x0000000000160000-0x0000000000186000-memory.dmp
    Filesize

    152KB

  • memory/2144-270-0x0000000000160000-0x0000000000186000-memory.dmp
    Filesize

    152KB

  • memory/2144-275-0x0000000002500000-0x0000000002502000-memory.dmp
    Filesize

    8KB

  • memory/2144-280-0x0000000000160000-0x0000000000186000-memory.dmp
    Filesize

    152KB

  • memory/2144-8-0x0000000000160000-0x0000000000186000-memory.dmp
    Filesize

    152KB

  • memory/2144-4-0x0000000000160000-0x0000000000186000-memory.dmp
    Filesize

    152KB

  • memory/2144-2-0x0000000000FC0000-0x0000000000FE6000-memory.dmp
    Filesize

    152KB

  • memory/2144-1-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB