Analysis
-
max time kernel
131s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 19:04
Static task
static1
Behavioral task
behavioral1
Sample
13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe
Resource
win10v2004-en-20220113
General
-
Target
13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe
-
Size
14.9MB
-
MD5
a2e629210482c695662cd4febf670577
-
SHA1
4583167b578350ed5f33e2dabb8ff9d973089b09
-
SHA256
13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c
-
SHA512
7b231d57af0ca7cb5a0ce5085bb2e282c8365b52f02cc0f6d7ba9cf716688e20ab82cb1e8aae6a7f84abbb866bfbcadd2919cea0f4ac707e1f82222166251bb4
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
Processes:
resource yara_rule C:\Users\Admin\Desktop\RevoUninstallerPro_Portable\Revo Uninstaller Pro Help.pdf pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 31 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000008853287a1100557365727300600008000400efbeee3a851a8853287a2a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c0031000000000088536480100041646d696e00380008000400efbe8853287a885364802a00000033000000000003000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 7a0031000000000045549d9811004465736b746f7000640008000400efbe8853287a45549d982a000000ec0100000000020000000000000000003a00000000004400650073006b0074006f007000000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370036003900000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 7c003100000000004554a09810005245564f554e7e310000640008000400efbe45549d984554a0982a000000023301000000070000000000000000000000000000005200650076006f0055006e0069006e007300740061006c006c0065007200500072006f005f0050006f0072007400610062006c006500000018000000 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 268 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exepid process 1336 13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exedescription pid process target process PID 1336 wrote to memory of 1720 1336 13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe explorer.exe PID 1336 wrote to memory of 1720 1336 13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe explorer.exe PID 1336 wrote to memory of 1720 1336 13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe explorer.exe PID 1336 wrote to memory of 1720 1336 13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe"C:\Users\Admin\AppData\Local\Temp\13372c9ee33607078c92df2537d9600a4c4d3dd8b991fb56aacf281e10a9239c.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" C:\Users\Admin\Desktop\RevoUninstallerPro_Portable2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\RevoUninstallerPro_Portable\LicenseAgreement.txtMD5
c18309977e230c3216a6f8d2f72e28c8
SHA1e4112dc9cbe20b29de4d81f6eaf8512e9930a509
SHA256bc19d086ec4998adf348a54cce92ad5ceae6a729fcc76b5d1b1f2f73f319df00
SHA51208ed27de4b1f181f08b24eda1038f7dc12d8f3433ef61b95df7ac694d6009a93f2ff458a6defe5aa9cdd228b75c64f8d0af995d0926d9da21ebdae2b19a0535f
-
C:\Users\Admin\Desktop\RevoUninstallerPro_Portable\Revo Uninstaller Pro Help.pdfMD5
7e1640923eb9fff9e7e7271ed9301649
SHA117a9bf056789fbafd0cb3cfdf44e4e54c5d3ce65
SHA2564c597d92910d9be69bad33086ed960195008e4a362b93ad4e61467a15c5e19da
SHA5127392bd149169de36034f6544ac477c788b98d9380ab9c205c5d6c69d78dea9174471f9101d71423e1ec01f5a2a9d0880233b73d6840fdd15fed3ee8f69ac9b40
-
C:\Users\Admin\Desktop\RevoUninstallerPro_Portable\RevoUPPort.exeMD5
2bd423a31680a629d49706e0ead97da1
SHA11cc33dd011f9d97d45f8ae39712316196e015641
SHA2560771b98294719f47447123fcc3a819db4710eef00f38b6232b5e06abd86d850c
SHA51210644e6cb8faccfe26b2c4eed6b6f13d5ce6c4b702de02865a947ee010d46d051e341e41666c2c294a389d582483cba757ab477a2b44ef1fe248871ce0df74c1
-
C:\Users\Admin\Desktop\RevoUninstallerPro_Portable\rupilogs.rupldbMD5
7ddce4fe7f6a3d48c3508690b98d042e
SHA10a083109d5e09de97921e0463d5d0ffb88e593d6
SHA25696031cc05cde1082ba2d1a6aeefd631b4dc6e69491ed58d54eb53a0baecb5b18
SHA5122ce91883711dd0d1385dd2acf4474ae9056ff3ca0ce2d4fd0fb48a1ba8770063d9d20455810623686d7e48bdc9b5a6199ade0263a558811406285835a7d9bc1f
-
memory/268-60-0x00000000039C0000-0x00000000039D0000-memory.dmpFilesize
64KB
-
memory/268-61-0x00000000039B0000-0x00000000039B1000-memory.dmpFilesize
4KB
-
memory/1336-54-0x0000000076151000-0x0000000076153000-memory.dmpFilesize
8KB
-
memory/1336-57-0x0000000074521000-0x0000000074523000-memory.dmpFilesize
8KB
-
memory/1720-58-0x000007FEFBC11000-0x000007FEFBC13000-memory.dmpFilesize
8KB