Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-11-2020 16:20
Static task
static1
Behavioral task
behavioral1
Sample
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
Resource
win10v20201028
General
-
Target
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
-
Size
270KB
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
-
SHA1
a9bf1c6f3f08203cf10fdaf141012dc83646aee1
-
SHA256
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
-
SHA512
ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
Malware Config
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.cab/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.nu/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.link/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.tor2web.org/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion/DA18-B58F-AE58-0072-8277
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277(Get
http://bqyjebfh25oellur.onion.cab/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.nu/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.link/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.tor2web.org/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277);
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion/DA18-B58F-AE58-0072-8277
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Ursnif RM3
A heavily modified version of Ursnif discovered in the wild.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exesysteminfo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe -
Executes dropped EXE 2 IoCs
Processes:
systeminfo.exesysteminfo.exepid process 1976 systeminfo.exe 1064 systeminfo.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
systeminfo.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\DebugRead.tiff systeminfo.exe File opened for modification C:\Users\Admin\Pictures\StepUninstall.tiff systeminfo.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1948 cmd.exe -
Drops startup file 2 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exesysteminfo.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\systeminfo.lnk 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\systeminfo.lnk systeminfo.exe -
Loads dropped DLL 2 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exesysteminfo.exepid process 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 1976 systeminfo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exesysteminfo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe -
Processes:
systeminfo.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA systeminfo.exe -
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html js -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
systeminfo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp4F.bmp" systeminfo.exe -
Drops file in Program Files directory 15 IoCs
Processes:
systeminfo.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.html systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.url systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.url systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.txt systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.vbs systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.vbs systeminfo.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
Processes:
systeminfo.exesysteminfo.exepid process 1064 systeminfo.exe 1976 systeminfo.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1732 taskkill.exe 2292 taskkill.exe -
Modifies Control Panel 4 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exesysteminfo.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "312063679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e8b226fab9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62050D51-25ED-11EB-AA42-6A86915434CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000c0cd81287aa1067faa50591ee0406ce308c2564a959c46c9c7e7c9ea0847b1ca000000000e80000000020000200000007e54b5ab7653307feb4c6f6f99c82cc8ef7ca1829b1c558f5a5603eaf8e4d10520000000fb544ee439160fcefd13d45dac0d7952fa63506ec9f1a496dbcac29762f590a04000000020cd84c0b8ee7fa478d36d89b1bb05fe1610a51ea6445da21c3e8a1f5d0cb2062719098a7126e06acb3904c2f23e86ee7c25a3d8e89d5bd8b547463862d9bb24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62370A31-25ED-11EB-AA42-6A86915434CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 240 IoCs
Processes:
systeminfo.exepid process 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exetaskkill.exesysteminfo.exesysteminfo.exeAUDIODG.EXEtaskkill.exedescription pid process Token: SeDebugPrivilege 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Token: SeDebugPrivilege 1732 taskkill.exe Token: SeDebugPrivilege 1976 systeminfo.exe Token: SeDebugPrivilege 1064 systeminfo.exe Token: 33 2140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2140 AUDIODG.EXE Token: 33 2140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2140 AUDIODG.EXE Token: SeDebugPrivilege 2292 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exeiexplore.exepid process 644 iexplore.exe 1144 iexplore.exe 1144 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1144 iexplore.exe 1144 iexplore.exe 644 iexplore.exe 644 iexplore.exe 1144 iexplore.exe 1144 iexplore.exe 344 IEXPLORE.EXE 344 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 3 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exesysteminfo.exesysteminfo.exepid process 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 1976 systeminfo.exe 1064 systeminfo.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.execmd.exetaskeng.exesysteminfo.exeiexplore.exeiexplore.execmd.exedescription pid process target process PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe systeminfo.exe PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe systeminfo.exe PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe systeminfo.exe PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe systeminfo.exe PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe cmd.exe PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe cmd.exe PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe cmd.exe PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe cmd.exe PID 1948 wrote to memory of 1732 1948 cmd.exe taskkill.exe PID 1948 wrote to memory of 1732 1948 cmd.exe taskkill.exe PID 1948 wrote to memory of 1732 1948 cmd.exe taskkill.exe PID 1948 wrote to memory of 1732 1948 cmd.exe taskkill.exe PID 1948 wrote to memory of 1360 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 1360 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 1360 1948 cmd.exe PING.EXE PID 1948 wrote to memory of 1360 1948 cmd.exe PING.EXE PID 1248 wrote to memory of 1064 1248 taskeng.exe systeminfo.exe PID 1248 wrote to memory of 1064 1248 taskeng.exe systeminfo.exe PID 1248 wrote to memory of 1064 1248 taskeng.exe systeminfo.exe PID 1248 wrote to memory of 1064 1248 taskeng.exe systeminfo.exe PID 1976 wrote to memory of 1144 1976 systeminfo.exe iexplore.exe PID 1976 wrote to memory of 1144 1976 systeminfo.exe iexplore.exe PID 1976 wrote to memory of 1144 1976 systeminfo.exe iexplore.exe PID 1976 wrote to memory of 1144 1976 systeminfo.exe iexplore.exe PID 1976 wrote to memory of 1840 1976 systeminfo.exe NOTEPAD.EXE PID 1976 wrote to memory of 1840 1976 systeminfo.exe NOTEPAD.EXE PID 1976 wrote to memory of 1840 1976 systeminfo.exe NOTEPAD.EXE PID 1976 wrote to memory of 1840 1976 systeminfo.exe NOTEPAD.EXE PID 1144 wrote to memory of 344 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 344 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 344 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 344 1144 iexplore.exe IEXPLORE.EXE PID 644 wrote to memory of 768 644 iexplore.exe IEXPLORE.EXE PID 644 wrote to memory of 768 644 iexplore.exe IEXPLORE.EXE PID 644 wrote to memory of 768 644 iexplore.exe IEXPLORE.EXE PID 644 wrote to memory of 768 644 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1344 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1344 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1344 1144 iexplore.exe IEXPLORE.EXE PID 1144 wrote to memory of 1344 1144 iexplore.exe IEXPLORE.EXE PID 1976 wrote to memory of 1808 1976 systeminfo.exe WScript.exe PID 1976 wrote to memory of 1808 1976 systeminfo.exe WScript.exe PID 1976 wrote to memory of 1808 1976 systeminfo.exe WScript.exe PID 1976 wrote to memory of 1808 1976 systeminfo.exe WScript.exe PID 1976 wrote to memory of 2236 1976 systeminfo.exe cmd.exe PID 1976 wrote to memory of 2236 1976 systeminfo.exe cmd.exe PID 1976 wrote to memory of 2236 1976 systeminfo.exe cmd.exe PID 1976 wrote to memory of 2236 1976 systeminfo.exe cmd.exe PID 2236 wrote to memory of 2292 2236 cmd.exe taskkill.exe PID 2236 wrote to memory of 2292 2236 cmd.exe taskkill.exe PID 2236 wrote to memory of 2292 2236 cmd.exe taskkill.exe PID 2236 wrote to memory of 2348 2236 cmd.exe PING.EXE PID 2236 wrote to memory of 2348 2236 cmd.exe PING.EXE PID 2236 wrote to memory of 2348 2236 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe"C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Gathers system information
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:406530 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1840
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1808
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "systeminfo.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "systeminfo.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2348 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1360
-
C:\Windows\system32\taskeng.exetaskeng.exe {73611AA5-DC7C-4DFE-8844-B3511293F755} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exeC:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe2⤵
- Executes dropped EXE
- Gathers system information
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1064
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2092
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
MD5bffb9b030c35a434dd1b6d45315729bd
SHA15557b8b81ccad2f197d2ac59408e88fdad564bba
SHA256e404cc1fd057a05070eaf713991eca3faf3d25de363ab390e8fd08b517ff9860
SHA5121e4a2b5072b544a21350dc7615b2d359ab7ff11b2918936041049663212c2ea4533d23170482e1f998fd7759557657bfbc8e62de385e029104d8bff33f81891a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{62050D51-25ED-11EB-AA42-6A86915434CB}.dat
MD57ab1e76e578d4fbe241997f7c81d3922
SHA1f78b9337e903925b075a0a7528d284aaf7a52ed3
SHA2564fd2f944b77916112cb83523484bb88bef175502a6a8da94ab6e440c8e60962a
SHA5122a5add4da0822070806bb860765c04282908b704df8c0a19161464725d09709e4f96c9a2764d658c78dc6a1ac53c9efb272d95c73284eba09f06ef4016d75d33
-
MD5
c8b6a0e2f978948e385478c3a59a2953
SHA156fb7ae567a135324070b4e8f6bb2d89fbdd47cd
SHA256ebfd7c03b8dadb112626fed4ff4e04f57769432fcfbdadebf70298218e8fdc33
SHA5125121289ae34e8b1c6319454cad6005368105bb3be7bfd6df772fc302c139494262149c208c01d4fb4c3d2d8c5add9dd2d0b56e72cc7fd1363b89f726bdbe7db0
-
MD5
65d2a89bb64df3fb396a269898bb3b16
SHA11d99f7f7e873f83273fd371f541096dee4af8515
SHA256efa9bafa28fe45d77304383a492aac54dc6b51905001ae2c2578fcf9be056164
SHA5127c71bc6c7b51b99b3223f1ba4621c0e7bb686508a86c7341e7a13fdd00f0a648d08afcd127c6c134eda38a514770eec63a86ad7ed5af709db11f2740e7e56c36
-
MD5
ef971cb0ec9206df219490f6066ecaa5
SHA1b0d3d899deae997b02f2b16f0e712f5065d43686
SHA2568a256a2ec03f35f50edf6123147f5de2b65f04c3854e29d23e4764df31b9eb5d
SHA512557a3e6e7e72f413d85dfb0f68b505378ecf415670f6cf4d4605bb9bbf560530cf08f4468f0c860c3f63e841f97877932c8f6d18e51b8922171a656f22b37404
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
d3d229033531532ad4605277912f723b
SHA14fe1657f2f982849d490723484b8267574f0ae91
SHA256d8735658c47a5530d5b979368e269b6b222270cbe8889a18e1989c894d76f016
SHA512293619ec9de14635c40b7947997a5e391a6eecef21de01dd256a35baad6f855771f0d9edec25cf5b96c29129945a70352e9af1456a28a09827ca5c189f45713b
-
MD5
f032c07adf72af6df8b64d99ecead53d
SHA1de8d9825a31a34c674dc5c11244611c275b8889a
SHA256d53d3efcc7ea6cedc0ae3263dfe299459186cf1bbc4bc5bbe0eb38122671263c
SHA512dcd3534aa8c758ef06a21e65d84ee1d6dba07d54f7e1bba6b83c68de4ac6566bdc69d5c200d34cead5b83dea7a3be6ac0de5bd22ce966791027f3d1c23e2a8f2
-
MD5
00f6a618918d1f92c8e54b127ad33ba3
SHA12fba619625b557b214cfa7ee31c3a57a60ea183e
SHA2561c66e8d1948b1eb7642530d4b891dabed9f960f2419ccff4e1b1e263a3909121
SHA5123aa0824103cfa007f147ef47a14f1b3574852751d78238d1c85e04ae97349938d4eb41681372d2746db2a79828ea7c3e38f5cc3df4ab00c915c75db65a214402
-
MD5
1c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b