Analysis
-
max time kernel
4294182s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
12-03-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe
Resource
win10v2004-en-20220113
General
-
Target
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe
-
Size
552KB
-
MD5
b5afdac3b6cac4f00ac7c5fac52c121e
-
SHA1
5042c01d146a7db2dc522e8852ce06c9da820888
-
SHA256
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949
-
SHA512
29d91b8ad41ba6b758952af5a42f25815296ee30aef89d50aa0790611451f62b5a1f59e5a41a9c0c6ea1c42b357aef48abc6f059a78644b65aeb5ba993828b05
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71E1A2F1-A1FC-11EC-8FB8-C27F05204187} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c096a45e0936d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "353851604" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004dda8e4cddf84341b86bc814e98354e500000000020000000000106600000001000020000000e56ded7920c8623ba6ac9c54735d9be1a5d032b04c8095996cda82c30c65f39c000000000e8000000002000020000000b5dbd5f8cc9c60f6f7aa63ba0fdabe229486ac2c9eeba89b1970facdda950edf200000004fd7552343d32c66510970aa324e9a622ade1f3f0c33f15093131b3f86e80466400000007e885103d0f407c5d7be733a77755648381dc219b4e16f6f440b6536d54df031105713ef38d46f0ca00f47794c5f52fd9ce5f94323d93e32109612ddc5ecaa2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1412 iexplore.exe 1412 iexplore.exe 392 IEXPLORE.EXE 392 IEXPLORE.EXE 392 IEXPLORE.EXE 392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exeiexplore.exedescription pid process target process PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe iexplore.exe PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe iexplore.exe PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe iexplore.exe PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe iexplore.exe PID 1412 wrote to memory of 392 1412 iexplore.exe IEXPLORE.EXE PID 1412 wrote to memory of 392 1412 iexplore.exe IEXPLORE.EXE PID 1412 wrote to memory of 392 1412 iexplore.exe IEXPLORE.EXE PID 1412 wrote to memory of 392 1412 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe"C:\Users\Admin\AppData\Local\Temp\8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
MD5ad2d0237958401f28f9c48382459ff74
SHA1ac32cf2766e96e9cf2ab499fd7907bb46992a880
SHA25627cb9770383ccb2beb45ce68b57a50eceb29a2b1da1acaad46f810994d24b65f
SHA512db0e665bdae626251e5c7a8916ae98e4c764ec39dd1715c4e6b56777a033dd0188baa40cd7e1ff2da7f350a0313d0981a5c8a0e268ac71de21f034f3dcb8cb77
-
MD5
5420d25816a52011e893fdc9e64d350b
SHA1ec616b20e447258e7ee58b6cf1564dce136a4148
SHA256459179ea0821a41c2641ed6114065183458c5b02256596b16d3f524715dc02f1
SHA512325c4c1033e77d86af2edc742b28031a2da16c50b92fe704febd0988a0941ce5dd5969d037e3e1dfa852d30c79f1b76e6cb61936f30e85e75ebd3ee25cb1f557
-
MD5
3e755c29a77f21ba889e852913e04cc9
SHA1f08474b73459aba0a488a6aaea0ecc01bfc1c3d9
SHA2566f0d53da2ffc230492672fbadeab0f774faf81b71236d94deff09588e7ec1235
SHA512f4a9ce6f420382c774a4b4235618e73aebceca725023a76707b240b2f027e4b6ff458d8bbb04ce84c5cd16b630c768546af64954333e5ff7337e48fa788120bd