Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe
Resource
win10v2004-20220812-en
General
-
Target
cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe
-
Size
141KB
-
MD5
7de91bef548111c7abdaf55aa5c91ffa
-
SHA1
ae8c1ccc8c7df89bb041e3c4575910d34495c4a4
-
SHA256
cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe
-
SHA512
b6bdff3cfb61176440c6006544575ac7d9e534859993beb46ee9e658b3cef3f0b5a7aea40e08eafa08d1bec0164b236b0beedf1c6d9d3e307a5c441ec183a9b8
-
SSDEEP
3072:Mepmq4hYt4iVRLAw0WbSBLrFCzPtOATw:MImq4hC4cRUw0OSNG4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC1326A0-37D1-11ED-A503-626C2AE6DC56} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Download cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370326008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1872 cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe 1744 iexplore.exe 1744 iexplore.exe 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1744 1872 cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe 27 PID 1872 wrote to memory of 1744 1872 cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe 27 PID 1872 wrote to memory of 1744 1872 cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe 27 PID 1872 wrote to memory of 1744 1872 cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe 27 PID 1744 wrote to memory of 524 1744 iexplore.exe 29 PID 1744 wrote to memory of 524 1744 iexplore.exe 29 PID 1744 wrote to memory of 524 1744 iexplore.exe 29 PID 1744 wrote to memory of 524 1744 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe"C:\Users\Admin\AppData\Local\Temp\cb7a566b889230fc6712f5125cc6d25ed0fc6f504e28b0a2d100470047e96cbe.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=vsd3g0h_vs02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:524
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5170ff0af58dc4f31296493af810fe491
SHA13bef4277aca6af058609f45b5ff022f68d2527e9
SHA2567b1297588e90311f3096c6a89e34f25855a6109873dc575a360d4c83b38a8c27
SHA512479ebde3b2414890825a66951dc32688bead41145f57e17b10faae8014f444b8341d0a75536cd752eb12ef1a69d19b8c2dc6fb4ceedf51e325b393a4bc538cc6
-
Filesize
5KB
MD5c438f324863cf2a4b55a17bd3dc15c2a
SHA1fc8a2e679272ee33d1a2874a298aac8d8c9a1d0a
SHA25683a3efdd97c0feef82ae8e17a2d12c8ba464516e9006af74e0d150b3be8efddc
SHA512691df7503677fb2432cabd49a64131f525c1783c2ff24ebf8cd8a1458e4077b79e5c92f6d85f47002bca0a101aae1067be3e7f16ee7dcd21a03f0a547b4664e7
-
Filesize
606B
MD5e8ebfa8ee96cc7df78aefae375e1f497
SHA1857ea64e808269aa4ea6f930987d924286002b1b
SHA256047f151c04117c803016c28002bcc10d1301f11dd0ca694ecba2d0b00d14d7d8
SHA512c3dea00ca4784be7b0fe7aabb3db8b8bc402eb3e3b173befee8abc1f8a38d1133371467cdc8e2887fb82df47380e7604dde53f7a7634cf20f56c3ecdb6d8fc63