Analysis

  • max time kernel
    300s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:03

General

  • Target

    845263c86931440e934cf40f4461dc14903a474f6f5eab4773482842855ba1c8.exe

  • Size

    246KB

  • MD5

    7f61ab7160ccea4f69fed025fbbfdb30

  • SHA1

    88d06d4124bca680bf28dde09cc1c3995002eef3

  • SHA256

    845263c86931440e934cf40f4461dc14903a474f6f5eab4773482842855ba1c8

  • SHA512

    8ff46db7d1bfddef6bab676c1439207a7b755280720bf83406d95a700eac364ef667978a7e538cc3d6e2836487b38ddc34df288100b510e32d16f013ffd07d98

  • SSDEEP

    6144:clmE5hV/XRG4FmeAs32AcNhunE+AWTWk6+wv:2/XRG4FdAs32AeOWk

Malware Config

Signatures

  • Renames multiple (140) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\845263c86931440e934cf40f4461dc14903a474f6f5eab4773482842855ba1c8.exe
    "C:\Users\Admin\AppData\Local\Temp\845263c86931440e934cf40f4461dc14903a474f6f5eab4773482842855ba1c8.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Roaming\trust.exe
      "C:\Users\Admin\AppData\Roaming\trust.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('WScript.Shell');setInterval(function(){try{o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\SG','C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');}catch(e){}},10);"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 404
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1632
    • C:\Windows\SysWOW64\mshta.exe
      mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Local\\Temp\\845263~1.EXE');close()}catch(e){}},10);"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\trust.exe

    Filesize

    246KB

    MD5

    7f61ab7160ccea4f69fed025fbbfdb30

    SHA1

    88d06d4124bca680bf28dde09cc1c3995002eef3

    SHA256

    845263c86931440e934cf40f4461dc14903a474f6f5eab4773482842855ba1c8

    SHA512

    8ff46db7d1bfddef6bab676c1439207a7b755280720bf83406d95a700eac364ef667978a7e538cc3d6e2836487b38ddc34df288100b510e32d16f013ffd07d98

  • C:\Users\Admin\Documents\StartUnpublish.xlsx.zendrz

    Filesize

    16KB

    MD5

    2eb293f0c8e6ec49645888c545e407db

    SHA1

    9e4bcc687c2b42a1132faee5f09c797be484c132

    SHA256

    dc4b4d235fe0e01ca79ddde37d0cdc31f236fe8f2f5cd39ce08af0bc7f830970

    SHA512

    f1534b061cb799b406133861d0dd2cf3e8ce43e993d881d921aca600a16bb80b7e5a65940288e30430cb4f09e9b7c7fb868f49b667efe497885b0832c1526fc0

  • C:\Users\Admin\Favorites\Links for United States\Read Me Please.hta

    Filesize

    3KB

    MD5

    127956fd323de3ce35fe88762dba184a

    SHA1

    2997b76546b19afe99cf753363237849061b0903

    SHA256

    2ff7ac1008fb6e1cf164a8af01afb00aae81027a0ce840bffe94af56651ef1b2

    SHA512

    9e9deecb9901e3be7894b9703b040fe0b7859158cc17786806912a36b40aef9fb33d18f7ff2d08e2159b6f09e264494f3e24d71539c78a076ee34ad97081d4f0

  • C:\vcredist2010_x86.log.html.zendrz

    Filesize

    82KB

    MD5

    1e11582195969f779fee2a749170f8b2

    SHA1

    8f8008276262d38ed93b6e26ebd90c17d5b2f5d4

    SHA256

    1b7e0704394bb270b5d24ee8f9a511ac75801908edf04d8caf9172adb25eeaf3

    SHA512

    4f6cfef56521cc36c22e6e58c2e8d1097e220c9bc35f22c41341488d1e74ea3a3f2cd7d715fba8a64cdd8a9aa7b18a8fffb3f699c43d065f01dc3c1a40bdfb45

  • memory/2708-9-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2884-452-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2884-453-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB