Analysis
-
max time kernel
71s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-01-2021 10:55
Static task
static1
URLScan task
urlscan1
Sample
https://smartjack.ru.com/cgi-psl/todwll/we798orl4gjynq5hmbuc2a16zxdpskt0if3vl4e1toxrhiyva5gu6f7znqw3d98jmpsc0k2b04if61zjl2sek9wnybtd8ugcxm7o3qarh5pv?data=cmRpcmVuem9AZXZvbGVudGhlYWx0aC5jb20=
Behavioral task
behavioral1
Sample
https://smartjack.ru.com/cgi-psl/todwll/we798orl4gjynq5hmbuc2a16zxdpskt0if3vl4e1toxrhiyva5gu6f7znqw3d98jmpsc0k2b04if61zjl2sek9wnybtd8ugcxm7o3qarh5pv?data=cmRpcmVuem9AZXZvbGVudGhlYWx0aC5jb20=
Resource
win10v20201028
General
-
Target
https://smartjack.ru.com/cgi-psl/todwll/we798orl4gjynq5hmbuc2a16zxdpskt0if3vl4e1toxrhiyva5gu6f7znqw3d98jmpsc0k2b04if61zjl2sek9wnybtd8ugcxm7o3qarh5pv?data=cmRpcmVuem9AZXZvbGVudGhlYWx0aC5jb20=
-
Sample
210122-36klftm2x6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33A8C1B2-5CA9-11EB-B59A-E6CA00F544D8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104e5b0db6f0d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "318098308" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "164561575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30863542" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000033348f0b6d2336e2acb1f6c392d4489e337adee6023f83d1fee0b3dc6c8dc9a000000000e8000000002000020000000b99bb9d8ef9381feb111bc83c057006e3cf9681bd7898f8381fd2c0f8a14c5452000000008087098d2e42ef2ad2c17edc138e1cf3f435e4f0bbb2fc580e84a6ef975c55640000000da075ad7f6d96a2a408e6b139071731552dbed9b55616f70fa6edb7a2eb8d42b54be6b388a3680a4aa0f30765b04412b7fe53271a9cbcadb69aaa4538b2d22ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "318130299" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "179562851" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30863542" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000001894b5cfdafc219d80a646106e876c783c4217e6e6136330b66a6a4fc56280e9000000000e8000000002000020000000edee27da281eaf5c9f3aa4e5ccdbae9d9a01ebe9a9678ad1de6fcc934b5f320e200000005f06e76a506cf731be96de4979b6b0d5212e8fb43891119a2842a67d9136fbe440000000070b39da0c48d62b7555f5832324637cdc3b17e9bef191219863d33ecdeb65228bdf2d708a2287d901b676c3cfe055eae99c26e8dbb9381898bcdc2b1d01ef60 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "318081713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "164561575" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30863542" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60543c0db6f0d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 652 iexplore.exe 652 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 652 wrote to memory of 2936 652 iexplore.exe IEXPLORE.EXE PID 652 wrote to memory of 2936 652 iexplore.exe IEXPLORE.EXE PID 652 wrote to memory of 2936 652 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://smartjack.ru.com/cgi-psl/todwll/we798orl4gjynq5hmbuc2a16zxdpskt0if3vl4e1toxrhiyva5gu6f7znqw3d98jmpsc0k2b04if61zjl2sek9wnybtd8ugcxm7o3qarh5pv?data=cmRpcmVuem9AZXZvbGVudGhlYWx0aC5jb20=1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:652 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
8bff577f417ebfb33409f678cdd512d7
SHA1e2e561e87dddc04adc7496817c28104e09e79c69
SHA256da17255c28bdbff0849c4913d6307ba840cf89822019e9efe6e7680d2b99eab3
SHA512fa63eca2404dece12fd8635aec294580d1a45327897ad49fface5f9e6c3eb73d2eea9544930e3832e39fda04233fae5bbd5ac8b1f18a4f370284615ac44e19c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
363ce345dd84ac3a6edb0653e87b62a2
SHA12925219d92bf0315a2a5c6099c8b63dc6df5a718
SHA256067cabdbae3ce4c23f1e43b5f564d69b41d75ebb0cadeffdedc8bf3f3f959cad
SHA512d324d1f2c59d9b71e80958194a096efcb581c987c566179649a9c0e5beeff4344efac93db77047a3fe1700e266aad3e8170a4f7fd1340ee8abe6669d77ea9089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
3c7d8e0c75d454aa04611f40d4d2b83b
SHA1325fbac43c67d772aabc43ea9e1898b45540a1fa
SHA25605d24317f4f2d18cbb4572e508394e19411f3cd5f5f42974d8ae46484fa08978
SHA51239f64dbab85b4f821ae7066723a4be7a00683198e5c60577d7dbf2609282b76658d38f7eb8f7f2edaad14a4592e5c19475c985a86072f4c2bd72aaa380b65f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
5cc93773139fabd72936686d59ca8234
SHA117f22ae671c40979a73459d525cdd66b05930a4a
SHA256a5802542950450b3603cab9736951ac5bf46b88ae06ee657fb1e73b4c784ab25
SHA512af69105116e7bf5dcaf62cdd8f30392e40c5801eee695a25fdaa61ee0cc978ced93a3d170f953f0fbc8ba68ab0c8421a475ebd7ed733955fa94333d341f480b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
4410771dcac33a304c683841f7e91870
SHA1b552e82b3a5cdf9be515f926e313b3f56bb75581
SHA256b4509037a30b83d4029fb4f337a07ac514a2938ed484f9d3b18ad6fa2fa5dc59
SHA51273ebddc2b739743f2f2a847268c4999ef6e8dd1d15b3ffcd599f29390a636c61ac4d73fd79a9c32145640fcde6e45d6768c3233866189f376fcfef6de570c8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
46ed54a439410c79966a6b5b03181013
SHA1fc0dfd12e210626cfee59c38950baf2be0c078bd
SHA256e722b342ca980a55314c27725844e4ea5a22887626ad90d3357a01570f5b297d
SHA51219b08a38aa858c4707b60f1c30054e408528b7839020432871c34ca8a6db649bdcbc2122fd286a0911e74b29bd234cd90b859294343707419d46ab491ab8555a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UU92537Y.cookieMD5
8dd4dbe3b34814fe7777c94e9f4ab5c5
SHA1b1cc8648ad4deba5a8d250a988ac76354f20ac4c
SHA256edcab6a8bf1a4a5be96514e4cd3d7d47bc66a883daadde4b501397461b6473c3
SHA51229036e7d741a9f3c0773ced219c799c462762f1211ae2d548bbd6c02c0f1c1febebacfc3500ba21ab0313ed234705777eefbe4c76a898bc8e534ce5c4d31694b
-
memory/2936-2-0x0000000000000000-mapping.dmp