Analysis
-
max time kernel
107s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 16:18
Static task
static1
Behavioral task
behavioral1
Sample
98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe
-
Size
2.4MB
-
MD5
454cbc6b215a2fb9bba389dff2bcb81c
-
SHA1
8e0662edc78a28fc0b4602120bb0042bc89db5da
-
SHA256
98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6
-
SHA512
a334a2f4573bc87ee180e284491b173dec03e6b566a56defb4538de653469a2250b804a14c23b6e0b3ba100ffb9aa0640eb6fa3bd16038f138c9c591deae069f
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3368-130-0x0000000000AB0000-0x000000000123A000-memory.dmp upx behavioral2/memory/3368-131-0x0000000000AB0000-0x000000000123A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe = "11001" 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\DOMStorage\adobe.com 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\adobe.com\NumberOfSubdomains = "1" 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\auth.services.adobe.com\ = "48" 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\adobe.com 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "48" 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Internet Explorer\DOMStorage\auth.services.adobe.com 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\adobe.com\Total = "48" 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exepid process 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exedescription pid process Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe Token: SeIncreaseQuotaPrivilege 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exepid process 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe 3368 98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe"C:\Users\Admin\AppData\Local\Temp\98af34670ef72cb4917070aa2848c9305cb14471679db7f2eb470561fc72ffa6.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx