Analysis

  • max time kernel
    840s
  • max time network
    841s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:43

General

  • Target

    a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234.exe

  • Size

    246KB

  • MD5

    7ec4fb3737e96c0aef2f98d20013dc5a

  • SHA1

    4e8a042292c4ef20556d4aedf5b3ea0a29d2fbe7

  • SHA256

    a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234

  • SHA512

    849ab6bfd9f61a10d29b727e0bfcc7804653764e2d4a9a01515a48b6ff52e37fd1954715d8decb7bde819bf490563924c3d8e51dcaf8218c40852ffdf9d65eb8

  • SSDEEP

    3072:6NBbOKnoIKE+Ypjf+MGtmhoWk6a1wKyPK:clmE5jfwWk6+wv

Malware Config

Signatures

  • Renames multiple (157) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234.exe
    "C:\Users\Admin\AppData\Local\Temp\a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Roaming\trust.exe
      "C:\Users\Admin\AppData\Roaming\trust.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('WScript.Shell');setInterval(function(){try{o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\SG','C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');}catch(e){}},10);"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2404
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "C:\Users\Admin\Read Me Please.hta"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2412
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');close()}catch(e){}},10);"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2408
    • C:\Windows\SysWOW64\mshta.exe
      mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Local\\Temp\\A42252~1.EXE');close()}catch(e){}},10);"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Favorites\Links for United States\Read Me Please.hta

    Filesize

    3KB

    MD5

    575f08db91dfc9a689cf26886ed167f0

    SHA1

    03276b77e5df8d00fb5aa93e270893fa8daf35d8

    SHA256

    8663e38f64a6204ef45990a5bd4454a77f7b9938a0008b7c039491d2a200edfd

    SHA512

    e954bed8f580a9760b78ed5f2e1e165048e137f8df6f7eb6de7bf7c4304eae1935e5d37f15e25df7ad9f059b51591567fb4fa7327b2c3b936c01dc78fa1f5ed4

  • C:\vcredist2010_x86.log.html.zendrz

    Filesize

    80KB

    MD5

    f9ae16b19004816012947c7922ec2383

    SHA1

    56a7f363311accfa28ab058c37b24a1bfb270abc

    SHA256

    f0edb8eee2db641027c151af9230b6ceb8e7f9aab82f675dd5c7685022aeee02

    SHA512

    e52ec7d99eca3c26ee0b92c6f596382ee8c04021ec57e8c19eac1ca860915faa15bb7392647924176cd2e5866494f843a758be04f7f842efcff9a9e35f94333b

  • \Users\Admin\AppData\Roaming\trust.exe

    Filesize

    246KB

    MD5

    7ec4fb3737e96c0aef2f98d20013dc5a

    SHA1

    4e8a042292c4ef20556d4aedf5b3ea0a29d2fbe7

    SHA256

    a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234

    SHA512

    849ab6bfd9f61a10d29b727e0bfcc7804653764e2d4a9a01515a48b6ff52e37fd1954715d8decb7bde819bf490563924c3d8e51dcaf8218c40852ffdf9d65eb8

  • memory/2732-9-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2968-504-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB