Analysis
-
max time kernel
126s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe
Resource
win10v2004-20220901-en
General
-
Target
d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe
-
Size
139KB
-
MD5
a679956b0bbf6e98152ba421070153d0
-
SHA1
e41158d6aa265d60528082cba1586ff32ba29cae
-
SHA256
d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0
-
SHA512
2a2ee3d30ac8bbe69b921860703685c296efd2167a84697e8a914e7ec47b11467b2edfdeafddc20c27abc08a850c07d65c9554bdb3b2fc9d29f0804724b08c0d
-
SSDEEP
3072:s+tBVTCKwmT6ZrAcrBFXa8WuXGCXpORV+3Ot8NxS:bbVuI6Weq8WuXGXL+m8z
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C89B6891-37D1-11ED-9584-C22E595EE768} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf0000000002000000000010660000000100002000000056022b53efc78fa2d8bf5eba150125b497e11df82d04872249c51dc6d013d9df000000000e8000000002000020000000bfed98a35b721a2395b4b6b557a6b6bf619840920a7045f0162e7b9c2a0a4d47200000009d3b1518863a0852a5367a4e5e4eada6aa8e4d698e19d86de546f8d3f5d8cd274000000044fc270b8d58a0da2b7f14bd46603bc9d11a59bcc2e48b0c481e713e8b1a6f9da298204bf47e4c4ed72d54f90cf30414a48ce4274990b7c4540cb5ff70af0194 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0caf7afdecbd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370325953" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf00000000020000000000106600000001000020000000d6d3dca5e3c073477c7c148cf5cb5fc21f660773599c475393350eb862b08a15000000000e80000000020000200000004d24ad5bb5afeb030c89d3a349bc4a958067119bf11494b52b4ce026f8e489e9900000004019d8f9afa11fe370ca3babb029d2bfb97933cc0fe8009ff78db4bef548f2254374fcf79feae231b893d64abc4f503850ecbb9e2f58c2a4e5a0b25b254f1694f78cd4b04bd7878119417eea261b53d16f32b0848bc60e963d95ab8f5d1bb144bf12700ce35672952812f841974e315005a968ab93ef0f038677191bb4917627df128aa66fcc5b79cdf34b7c0b07600c40000000e15a6da7353615ebccb2d5b4f190de2a147bc07b6b7ac099c77f9858389c54b16c670e0267b556b706c1be8fd9e5f46a4bbf9d5f8d43fa5e9399bd80f36c23b9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1412 d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe 1752 iexplore.exe 1752 iexplore.exe 1016 IEXPLORE.EXE 1016 IEXPLORE.EXE 1016 IEXPLORE.EXE 1016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1752 1412 d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe 27 PID 1412 wrote to memory of 1752 1412 d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe 27 PID 1412 wrote to memory of 1752 1412 d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe 27 PID 1412 wrote to memory of 1752 1412 d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe 27 PID 1752 wrote to memory of 1016 1752 iexplore.exe 29 PID 1752 wrote to memory of 1016 1752 iexplore.exe 29 PID 1752 wrote to memory of 1016 1752 iexplore.exe 29 PID 1752 wrote to memory of 1016 1752 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe"C:\Users\Admin\AppData\Local\Temp\d48ba97015db9f8d2b06bbc4991b41df19ebff1f5f223aa3c27985a7b39beff0.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=vsd3g0h_vs02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1016
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD55f0aae443c99da71f04a24c712d90ce2
SHA1bee1b4f0bb8e9e5960458e26893e9a020384318e
SHA256f752f943e5928b60c358126fa271a794db4d4492095fa02b39aa3329043d9234
SHA512068a0b9ac29f4db6963c4741ec56a7c69787953a1eb5ed1f9ac3c12e3feb19953498913311a61203a50d1353da00aed06b1410ab14d0cf014752b986120cbd0e
-
Filesize
5KB
MD5bd0f9206f9b68d10aa6877f1f56f18e1
SHA1f1f17af9b9c38b44e069e5f416cd0bfaf8c3d910
SHA256771ccb85f950b27ebb80a50360c17d93b4f2489b4ef2fb464d6aeec7aa43411b
SHA512f0af907578d40c35d3469eade84ce33e6d475f87658d2e2ef446b98e5c8ab2f46b85a53d3049470512faf25ea92d2e8321228b69857985f5f242b270fc0aad9e
-
Filesize
608B
MD5fc1241a7af402c9fc48231bda4c5ad70
SHA1252aa8afc887668f6ca6e46c64cb9eabca19c78e
SHA256a98c7ff70e3522195afb955697b42e2b1897bf3002aca3fba27637885bb16350
SHA512e141bcd1eff2a77cc817f2106b5d5fbe5fff56a7e83908ce9587146c3c117d621840ddb916af0ca6cc4bf27a556011484185c2ecf9cdb6dda2531e59fda64e93