Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:03

General

  • Target

    8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821.exe

  • Size

    246KB

  • MD5

    04742f7774cda5b58d7e5c1ba5a4e941

  • SHA1

    a8e35ff71e0561268f8c3082bcaa2f314a272005

  • SHA256

    8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821

  • SHA512

    726974f82334c474b363d2232f21db2e04730965147e01f9ac5b8f06a44c873e78e2ee7982147c85dffb1eec40fdb445b18b67d4e25303f1dfc672f63f0b9562

  • SSDEEP

    1536:xQqUQQ5fNlzCKxOxwoBg5KE+Y5NpWEibmbkWuEZ8DIPsfie8Sf1wKygNiJK:6NBbOKnoIKE+YpWFCoWk6a1wKyPK

Malware Config

Signatures

  • Renames multiple (177) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821.exe
    "C:\Users\Admin\AppData\Local\Temp\8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Roaming\trust.exe
      "C:\Users\Admin\AppData\Roaming\trust.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('WScript.Shell');setInterval(function(){try{o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\SG','C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');}catch(e){}},10);"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2412
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "C:\Users\Admin\Read Me Please.hta"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:1388
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');close()}catch(e){}},10);"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2488
    • C:\Windows\SysWOW64\mshta.exe
      mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Local\\Temp\\8C5914~1.EXE');close()}catch(e){}},10);"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\PushJoin.xlsx.zendrz

    Filesize

    10KB

    MD5

    9f4a1a798ebddadd10b299bf0a99d7d2

    SHA1

    f06236fcf387f62e66f4288b8d6ca670aee30312

    SHA256

    cf760376ecd8b353a0b018520e5c124a133bce1d6e61b8c5cf09f3a31aca8138

    SHA512

    de0f3bf67def144c07fed77d550cf68171a2e45f4a1fc96ccc7129780328ef60ca69df484109ad6a0a847d7f22f68d640d05d70ef4585ec37bd2f83c1a787a32

  • C:\Users\Admin\Favorites\Links for United States\Read Me Please.hta

    Filesize

    3KB

    MD5

    885d0b93de32be773c1da4edac7822e7

    SHA1

    a7b89882d313c3a42d6dc25625e2d5e697accc34

    SHA256

    8ae0732ec7933377d023bde110c7f3998390ddfe54b29a42c4ed5efa7f876c14

    SHA512

    1e07036d51eeb155005aabd6500c8007200c41a4d5c8effdbc9fe711faad54d7519c4439161dc17d9182e71994ad619af3ad9cf818af3e05b4403b5939e61a7e

  • C:\vcredist2010_x86.log.html.zendrz

    Filesize

    80KB

    MD5

    3acffabe7cb5e46a7f0349913290e8e3

    SHA1

    8abce5bc6ba337cce142155059e27b23a091cfef

    SHA256

    7609a1ace06abe7f18a5934ab76ec842b6d8bdaf01a46bcf5a486b47fded255b

    SHA512

    dbc4d159a0e1e65925732356e158068f5509f14824c09444fdfb1c5f8276e5a35f7b59a317fe49ae59f8a6b8f4f1c3f8e6549fb2424531b6d267e959b834ac38

  • \Users\Admin\AppData\Roaming\trust.exe

    Filesize

    246KB

    MD5

    04742f7774cda5b58d7e5c1ba5a4e941

    SHA1

    a8e35ff71e0561268f8c3082bcaa2f314a272005

    SHA256

    8c591485357e45a09dad3116496e6f686fa11f445a6bea5ef3cd5ed1ac078821

    SHA512

    726974f82334c474b363d2232f21db2e04730965147e01f9ac5b8f06a44c873e78e2ee7982147c85dffb1eec40fdb445b18b67d4e25303f1dfc672f63f0b9562

  • memory/2096-9-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2368-564-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB