Analysis

  • max time kernel
    842s
  • max time network
    843s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:43

General

  • Target

    8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821.exe

  • Size

    246KB

  • MD5

    04742f7774cda5b58d7e5c1ba5a4e941

  • SHA1

    a8e35ff71e0561268f8c3082bcaa2f314a272005

  • SHA256

    8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821

  • SHA512

    726974f82334c474b363d2232f21db2e04730965147e01f9ac5b8f06a44c873e78e2ee7982147c85dffb1eec40fdb445b18b67d4e25303f1dfc672f63f0b9562

  • SSDEEP

    1536:xQqUQQ5fNlzCKxOxwoBg5KE+Y5NpWEibmbkWuEZ8DIPsfie8Sf1wKygNiJK:6NBbOKnoIKE+YpWFCoWk6a1wKyPK

Malware Config

Signatures

  • Renames multiple (171) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821.exe
    "C:\Users\Admin\AppData\Local\Temp\8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Roaming\trust.exe
      "C:\Users\Admin\AppData\Roaming\trust.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('WScript.Shell');setInterval(function(){try{o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\SG','C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');}catch(e){}},10);"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2800
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "C:\Users\Admin\Read Me Please.hta"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:916
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');close()}catch(e){}},10);"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:1672
    • C:\Windows\SysWOW64\mshta.exe
      mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Local\\Temp\\8C5914~1.EXE');close()}catch(e){}},10);"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\trust.exe

    Filesize

    246KB

    MD5

    04742f7774cda5b58d7e5c1ba5a4e941

    SHA1

    a8e35ff71e0561268f8c3082bcaa2f314a272005

    SHA256

    8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821

    SHA512

    726974f82334c474b363d2232f21db2e04730965147e01f9ac5b8f06a44c873e78e2ee7982147c85dffb1eec40fdb445b18b67d4e25303f1dfc672f63f0b9562

  • C:\Users\Admin\Documents\PushResolve.xlsx.zendrz

    Filesize

    10KB

    MD5

    a0cf74e66c6a15e97c4f3fa9abed4329

    SHA1

    03c8a321270bac2880ab4b186896b43ced8abc38

    SHA256

    24922aea70cbc4364fc5e9914cd158956a94e5c8f7398f7fa0a97b3fec89e10d

    SHA512

    704dbcb777898847416ac44036aa66745d470084b9291fdc2da9c01102b7b74dc509457b3e0a2f6489d858e314cc05811e55dbf18760a9d2c9c51069e1d1e43a

  • C:\Users\Admin\Favorites\Links for United States\Read Me Please.hta

    Filesize

    3KB

    MD5

    e7ad80688d82ad5d35754cd5915a2634

    SHA1

    22075c6c798d928abe2d55febb70015ba3424340

    SHA256

    9edf8b16c0060695096694d5a6201adc5cdc405b90911c321c64b769b61927f0

    SHA512

    1133684752c6e41c8a2b58b785462342c43939cf4f5a8e1c1ef06957958e6798566f1e941244e84a0d2e8a74d9525f5d7e7c0e80f4c25c82c5e1013ccb877f5f

  • C:\vcredist2010_x86.log.html.zendrz

    Filesize

    81KB

    MD5

    c18c217ec92076810dcfb97ce116b722

    SHA1

    cfffcc86042e0ff3232b395b58f7d3a9b4aa0d1e

    SHA256

    d6a4c9ea931b424823f17a8aec4268f40711cde72e6e45c43852b958a5c856de

    SHA512

    d3f475d9fa28eb3df4a34f5bd1ef0181d68fb8b0664127787ad1cd815fbf45be792805dafa24c0b55eb91444606ced01d074d5a71cba137884ba8530537e780c

  • memory/2664-547-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2748-9-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB