Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 05:27
Static task
static1
Behavioral task
behavioral1
Sample
805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe
Resource
win10v2004-20220812-en
General
-
Target
805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe
-
Size
32KB
-
MD5
36c26cf4c376eee2e9970c65a6bd82c1
-
SHA1
e8eaa54b31c1853410e6eb8a2a4e839d6d72d4c7
-
SHA256
805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04
-
SHA512
6d2b86636a43e21d9952040208607b116cf455aca222d352f1caf3ced41d01d48ab2979c41e3764b6645339775b54f9967942d76e43a1422785a3a4671acea1c
-
SSDEEP
192:p/33z1rWSUcVKbCBpLg1GqPQUS2b3z3ZuizSmiZBL/YfwDLXkUKfoa2hTbP4oynz:x7UcIbHDZxzSRLbHXvKfoa2d43KZZIl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\XunJie\command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\XunJie\command\ = "\"\" \"%1\"" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\ = "Ѹ½Ý" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\ = "XunJie.Association.HTML" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\DefaultIcon 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\XunJie 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\XunJie\ = "Ѹ½ÝÓÎÀÀÆ÷" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\XunJie 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\XunJie\command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\XunJie\ 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\DefaultIcon\ = ",0" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"\" \"%1\"" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\ = "Ѹ½Ý" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\XunJie 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\ = "XunJie.Association.HTML" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\URL Protocol 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\Shell\Open\ = "Ѹ½ÝÓÎÀÀÆ÷" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\DefaultIcon\ = ",26" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\ = "XunJie.Association.HTML" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\XunJie 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\XunJie\command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\XunJie\command\ = "\"\" \"%1\"" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\XunJie\command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\XunJie\command\ = "\"\" \"%1\"" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41906A82-C6BE-4329-96D5-543B29A18BA9} 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\ = "XunJie.Association.HTML" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\XunJie\ = "Ѹ½ÝÓÎÀÀÆ÷" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"\" \"%1\"" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\Open\command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\XunJie\command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\Shell\ 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\Shell\Open 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\Shell\Open\Command 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\Shell\Open\Command\ = "\"\" \"%1\"" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\XunJie 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41906A82-C6BE-4329-96D5-543B29A18BA9}\ = "IThunderMx" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\ = "XunJie Document" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XunJie.Association.HTML\Shell 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\ = "XunJie" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\XunJie\command\ = "\"\" \"%1\"" 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\XunJie\ 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4200 3180 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe 79 PID 3180 wrote to memory of 4200 3180 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe 79 PID 3180 wrote to memory of 4200 3180 805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe"C:\Users\Admin\AppData\Local\Temp\805996ea2acc0bbde8caeccf56129913c0819f6dd07242b073b4c7d69225ae04.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ydlem.bat2⤵PID:4200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5c2218281b28f4c8bc11c6901138174f2
SHA196300145a94be4e2f6bc131ad94fa950d08e3e1a
SHA256a328e798bcad2ce9e39ed47fdcc9836ab2fdddba88ad4debbef91c6c3d0d7c21
SHA512f0a487de0ef4c045832dc8d0aa344e990bb2f0da09482ed7e2bb7c80998890f292701fec3b92fa8184e1ec33af6ae986a6c81272b09d069bad567e00376f90ca
-
Filesize
32KB
MD52407b3e6b045e71c67c93268ea02038a
SHA1856c4e148029a2d55c205e3589929972112c1d36
SHA256ba3243be56fe34e2bdd0ab66b1e6804eb56a5a6537934bbcfc56aac5fa5cf0e6
SHA51258d5c3846900ff98c41e6c4c5f2e8586ad246fab5a267c1350f822f11a15a1517fd180a4e2cdc16afbfc9f8b23a2658f8c54a89ab9ee32d75b62f4d07e4f627d