Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe
Resource
win10v2004-20220414-en
General
-
Target
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe
-
Size
623KB
-
MD5
c24a08bfeb09c9842b8e6578d7b0b721
-
SHA1
937a77b8ad27217b346922cb5513458542e3d390
-
SHA256
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567
-
SHA512
42717c37604b41fff2bae91a22037f0e2b1d3514a8305d672595930f331a6a998d1a88741585413977ee81cd59ab155faf19ae654d229dc0256e30d71b222799
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exedescription ioc process File opened for modification \??\c:\Users\Admin\Pictures\ExportSearch.tiff df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe File opened for modification \??\c:\Users\Admin\Pictures\InstallUnregister.tiff df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1536 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\opt321 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe" df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\asasin.bmp" df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
Processes:
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\Desktop\WallpaperStyle = "0" df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\Desktop\TileWallpaper = "0" df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEF6A681-F97F-11EC-AC59-4224C87335A1} = "0" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exedescription pid process Token: SeDebugPrivilege 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe Token: SeTakeOwnershipPrivilege 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe Token: SeBackupPrivilege 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe Token: SeRestorePrivilege 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeDllHost.exepid process 2012 iexplore.exe 1516 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2012 iexplore.exe 2012 iexplore.exe 556 IEXPLORE.EXE 556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exeiexplore.exedescription pid process target process PID 2004 wrote to memory of 2012 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe iexplore.exe PID 2004 wrote to memory of 2012 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe iexplore.exe PID 2004 wrote to memory of 2012 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe iexplore.exe PID 2004 wrote to memory of 2012 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe iexplore.exe PID 2004 wrote to memory of 1536 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe cmd.exe PID 2004 wrote to memory of 1536 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe cmd.exe PID 2004 wrote to memory of 1536 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe cmd.exe PID 2004 wrote to memory of 1536 2004 df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe cmd.exe PID 2012 wrote to memory of 556 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 556 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 556 2012 iexplore.exe IEXPLORE.EXE PID 2012 wrote to memory of 556 2012 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe"C:\Users\Admin\AppData\Local\Temp\df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\asasin.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\df255af635a2dde04c031db95862f11e1bf44fe5cfc10d3b20bd4678ed818567.exe"2⤵
- Deletes itself
PID:1536
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5dfe7ab73072614daa14f42edd9bf48e9
SHA166a52d869e59620da90525531bb2ff050ba850ce
SHA2563c6c8ce0ac6302ee219bcadf7a67086349fdb20c5a8405938e2a5f6cba9a701a
SHA51231a28accba9abddaf3bd6216ff5ae03061999f86549efb302d3160659db91d0e9800fec10bef98c51d2fd23915d8b0af1f65504726a6695b64319fbdece03ed1
-
Filesize
8KB
MD5751552b4468b3896e00f6f475ca0c602
SHA1258e79bf1918a326b87c6535231952ade2afd72e
SHA256ba5fb21b3288c55428ac548e75c6ff9fdd35772a30a99bce1be24a78c6e0df4a
SHA5123eae870e5309e58f42ab7f1f09d63d88ad01c941dd6e7f864e6d353c3fd863962198ca1b6e158e96a2291081dffb0c9f5f0c9332d6b03ea33e737b989651d4ea