Analysis
-
max time kernel
4294182s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
12-03-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe
Resource
win10v2004-en-20220113
General
-
Target
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe
-
Size
552KB
-
MD5
b5afdac3b6cac4f00ac7c5fac52c121e
-
SHA1
5042c01d146a7db2dc522e8852ce06c9da820888
-
SHA256
8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949
-
SHA512
29d91b8ad41ba6b758952af5a42f25815296ee30aef89d50aa0790611451f62b5a1f59e5a41a9c0c6ea1c42b357aef48abc6f059a78644b65aeb5ba993828b05
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71E1A2F1-A1FC-11EC-8FB8-C27F05204187} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c096a45e0936d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "353851604" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004dda8e4cddf84341b86bc814e98354e500000000020000000000106600000001000020000000e56ded7920c8623ba6ac9c54735d9be1a5d032b04c8095996cda82c30c65f39c000000000e8000000002000020000000b5dbd5f8cc9c60f6f7aa63ba0fdabe229486ac2c9eeba89b1970facdda950edf200000004fd7552343d32c66510970aa324e9a622ade1f3f0c33f15093131b3f86e80466400000007e885103d0f407c5d7be733a77755648381dc219b4e16f6f440b6536d54df031105713ef38d46f0ca00f47794c5f52fd9ce5f94323d93e32109612ddc5ecaa2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1412 iexplore.exe 1412 iexplore.exe 392 IEXPLORE.EXE 392 IEXPLORE.EXE 392 IEXPLORE.EXE 392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe 27 PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe 27 PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe 27 PID 856 wrote to memory of 1412 856 8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe 27 PID 1412 wrote to memory of 392 1412 iexplore.exe 29 PID 1412 wrote to memory of 392 1412 iexplore.exe 29 PID 1412 wrote to memory of 392 1412 iexplore.exe 29 PID 1412 wrote to memory of 392 1412 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe"C:\Users\Admin\AppData\Local\Temp\8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=8bbd8cfbd8cdcb85db7eb16de379076560cfcf22f293b0664594fd260e6a9949.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:392
-
-