Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:03

General

  • Target

    a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234.exe

  • Size

    246KB

  • MD5

    7ec4fb3737e96c0aef2f98d20013dc5a

  • SHA1

    4e8a042292c4ef20556d4aedf5b3ea0a29d2fbe7

  • SHA256

    a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234

  • SHA512

    849ab6bfd9f61a10d29b727e0bfcc7804653764e2d4a9a01515a48b6ff52e37fd1954715d8decb7bde819bf490563924c3d8e51dcaf8218c40852ffdf9d65eb8

  • SSDEEP

    3072:6NBbOKnoIKE+Ypjf+MGtmhoWk6a1wKyPK:clmE5jfwWk6+wv

Malware Config

Signatures

  • Renames multiple (154) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234.exe
    "C:\Users\Admin\AppData\Local\Temp\a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Roaming\trust.exe
      "C:\Users\Admin\AppData\Roaming\trust.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('WScript.Shell');setInterval(function(){try{o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\SG','C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');}catch(e){}},10);"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2364
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "C:\Users\Admin\Read Me Please.hta"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2248
      • C:\Windows\SysWOW64\mshta.exe
        mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Roaming\\trust.exe');close()}catch(e){}},10);"
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2204
    • C:\Windows\SysWOW64\mshta.exe
      mshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('C:\\Users\\Admin\\AppData\\Local\\Temp\\A42252~1.EXE');close()}catch(e){}},10);"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      PID:284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\UnblockPush.xlsx.zendrz

    Filesize

    13KB

    MD5

    91260b4341b2c39a1816347a35795dfb

    SHA1

    90bdfd8b3c924cb6b2cc35d6ea90f1567e1ce13b

    SHA256

    052680afe26dd7b07305e75566e48ec9d42cde83210ce91b208de20c53910818

    SHA512

    459d03878103977c46e0f8ee9a6fc1dce08e55c55910ad82202bbafd7dcf0cedbbadd0fc4036f8da02be4551babed892571e5b8776c4ada32fe555c3bc058f39

  • C:\Users\Admin\Favorites\Links for United States\Read Me Please.hta

    Filesize

    3KB

    MD5

    9a5d76d370674fe246720b0f5c10b39c

    SHA1

    8ec7318698e51e6cc888545e7015bbec9fd55026

    SHA256

    32f64a75aa7d11efda067f4a0842a110789bc23cd01d44abcb0349759079967c

    SHA512

    ff6cbebe9c891d58eb41a75e218749154dfff76c8fe6ef669055ed8c65803b25a3ced8351e96f1362e38675198292a6d88aefd56b93deb109451dfb95e8a9d6c

  • C:\vcredist2010_x86.log.html.zendrz

    Filesize

    82KB

    MD5

    837375c31548ddae06fdd7c1e3c1076d

    SHA1

    cebe6e334e82bc6072ddb05623abeb2db102378c

    SHA256

    4460be824ddc7427d1d4f121ba019d74c1566c00fefb7af18f6cb46e15ac1b2b

    SHA512

    657e9eb22bf08daee088c2b33d1043477f2cf76fe06bb75b398158f60b3d2490f1fb69a8d6bf4d8696b2095bfb0942bcade8631fa910adf550fb666a62e63b71

  • \Users\Admin\AppData\Roaming\trust.exe

    Filesize

    246KB

    MD5

    7ec4fb3737e96c0aef2f98d20013dc5a

    SHA1

    4e8a042292c4ef20556d4aedf5b3ea0a29d2fbe7

    SHA256

    a42252e674a09a0b689e71c88f59969f538a473da647cc4eb5457a5d5e03a234

    SHA512

    849ab6bfd9f61a10d29b727e0bfcc7804653764e2d4a9a01515a48b6ff52e37fd1954715d8decb7bde819bf490563924c3d8e51dcaf8218c40852ffdf9d65eb8

  • memory/868-496-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2420-9-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB