Analysis
-
max time kernel
147s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 21:36
Behavioral task
behavioral1
Sample
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe
Resource
win10v2004-20220812-en
General
-
Target
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe
-
Size
639KB
-
MD5
3f2e09688d1d541397f21dde3c36b220
-
SHA1
2bf2c4270f4ca60588cae9364a4461d50d66d25d
-
SHA256
d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93
-
SHA512
f1a739a6165d9276c1791d1f549dab82fe14bf92c01721c4a121c4ebd5567ffeb22037b46c5e61bbd332a9f70f4bdb6961749fa62e419bd0436bc12fdb6d6ca0
-
SSDEEP
12288:CXW8FEaaem9Ipuj35XJIbp5GaH6u7hPvJczfGT/RWUqZvqmYDsOtABt:CV8emPj3F+caHXcbOMeNGt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 988 xDFcucTrsiBHqNOW.exe -
resource yara_rule behavioral1/memory/1172-56-0x0000000000400000-0x0000000000C05000-memory.dmp upx behavioral1/files/0x000a000000012319-58.dat upx behavioral1/files/0x000a000000012319-59.dat upx behavioral1/files/0x000a000000012319-61.dat upx behavioral1/memory/1172-65-0x0000000000400000-0x0000000000C05000-memory.dmp upx behavioral1/memory/988-66-0x0000000000400000-0x0000000000C05000-memory.dmp upx behavioral1/memory/988-67-0x0000000000400000-0x0000000000C05000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000004f507c6adbe6c9c5a85916ecb3764557e95ef0e59644d7ccc9dfee09b3a42565000000000e800000000200002000000052883b6774929e077b9235766557edfc7833c3ac7ddb21d0bb15fb8382051ce72000000025fd92b715886de77767a26d5d4625e21e112724e32dd38def235d2731d927d5400000002a6e1da879ad1de92f4b8fa5fe105b6ee80f23221ba39a3df3ed09de3af47829457680a2574c7629a9266d0f9e8c264f71cfad9e584993529846b88c0de5fe92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\lady-impact.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.lady-impact.com\ = "1056" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370429713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.lady-impact.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\lady-impact.com\Total = "1056" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000a61f0e50583205f7d3532c441179e73082734f0c58272468af3606cf2e3151ac000000000e8000000002000020000000517fd01a6024ae5a24a8b1f5052cd7c5f0e44e90a13c17ffd871eb001cca8cb090000000fc34b6144c9ef124da7cdc872a36253e71b83d2bcee999551df1f292db81721fb9d9c70d71cec3e8e91cef74626070e6cafe5af8ca5a3a355dfec26c75911621141a0eb32015f0324739ac749a74310cb989e26a9312a620255408d8987f5b4a4653a45f0d214bd675ee273e2e940b65d43ab9cc34f8d72867e31f007e0643a74c303d8df5bbc37016fe7847bb28eea4400000003f0e63a9966b9d7158fabe2cedb0661d462c9dd61a7de18ccad84e1766ef685c1b2f02760ade7ff06a30b1cfcea2c07ca117f1238e150fd2895ecaa6bfc4581b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6499B2F1-38C3-11ED-9C7C-660C31E8D015} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1056" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0902641d0ccd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\lady-impact.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 988 xDFcucTrsiBHqNOW.exe 1704 iexplore.exe 1704 iexplore.exe 772 IEXPLORE.EXE 772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1172 wrote to memory of 988 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 28 PID 1172 wrote to memory of 988 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 28 PID 1172 wrote to memory of 988 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 28 PID 1172 wrote to memory of 988 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 28 PID 1172 wrote to memory of 1704 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 29 PID 1172 wrote to memory of 1704 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 29 PID 1172 wrote to memory of 1704 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 29 PID 1172 wrote to memory of 1704 1172 d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe 29 PID 1704 wrote to memory of 772 1704 iexplore.exe 31 PID 1704 wrote to memory of 772 1704 iexplore.exe 31 PID 1704 wrote to memory of 772 1704 iexplore.exe 31 PID 1704 wrote to memory of 772 1704 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe"C:\Users\Admin\AppData\Local\Temp\d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\Identities\{F3E59648-B7E3-424E-9E75-330606DEBE82}\xDFcucTrsiBHqNOW.exeC:\Users\Admin\AppData\Roaming\Identities\{F3E59648-B7E3-424E-9E75-330606DEBE82}\xDFcucTrsiBHqNOW.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.lady-impact.com/member/exe_contact.php?33303133373539352⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:772
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56c6a24456559f305308cb1fb6c5486b3
SHA13273ac27d78572f16c3316732b9756ebc22cb6ed
SHA256efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973
SHA512587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda58505c9ea974ab404a7a171962593
SHA16d4a3f91042bb9b7fd3c763f0f2d5720b4ffbf28
SHA256b660665cf05f405cecf5a1e5cc82890a8728b5f5a2b52080fd5df47b707cfbd7
SHA512de03e2e12ff8eed53612d40dfa0f119211e86077c345af6e805adbcf883a184e3f3cefe1a59834c9f91959582cefb5bb90209db41eadb00f1328965505c8dc04
-
C:\Users\Admin\AppData\Roaming\Identities\{F3E59648-B7E3-424E-9E75-330606DEBE82}\xDFcucTrsiBHqNOW.exe
Filesize639KB
MD53f2e09688d1d541397f21dde3c36b220
SHA12bf2c4270f4ca60588cae9364a4461d50d66d25d
SHA256d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93
SHA512f1a739a6165d9276c1791d1f549dab82fe14bf92c01721c4a121c4ebd5567ffeb22037b46c5e61bbd332a9f70f4bdb6961749fa62e419bd0436bc12fdb6d6ca0
-
Filesize
603B
MD54455f8cded8248aab13a71e93dd07002
SHA1ad97317439319801a97a77ab490333500ab2d666
SHA2565d66b2da48ca6222d0d64e02a2d4e393ec21ff502fea3f4f3e2c4ea4fa933d94
SHA5127b81a2ef985432ebc8bae6f221590dea34f5d465b8947a24ed5c67ade84baba39732d838360dc59737ecdf81916681018e86f148c2d5033acb487c293b321873
-
Filesize
639KB
MD53f2e09688d1d541397f21dde3c36b220
SHA12bf2c4270f4ca60588cae9364a4461d50d66d25d
SHA256d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93
SHA512f1a739a6165d9276c1791d1f549dab82fe14bf92c01721c4a121c4ebd5567ffeb22037b46c5e61bbd332a9f70f4bdb6961749fa62e419bd0436bc12fdb6d6ca0
-
Filesize
639KB
MD53f2e09688d1d541397f21dde3c36b220
SHA12bf2c4270f4ca60588cae9364a4461d50d66d25d
SHA256d4849826c78aa884cd19297704e4f08a6205c9597a8846059d41026d05194d93
SHA512f1a739a6165d9276c1791d1f549dab82fe14bf92c01721c4a121c4ebd5567ffeb22037b46c5e61bbd332a9f70f4bdb6961749fa62e419bd0436bc12fdb6d6ca0