Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 06:24
Behavioral task
behavioral1
Sample
75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe
Resource
win10v2004-20220901-en
General
-
Target
75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe
-
Size
13KB
-
MD5
34456b6e8b46f7d803d7a1dd70260e75
-
SHA1
37c34f4c173c26a5751919c29cc06d081c816dfb
-
SHA256
75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e
-
SHA512
ca8f22395730ff9c50fde2c598128f1fe1d8cc4e5667bab193d4ef4fafa26d7e04e243d5a563b24bf1f3929e7d753454befdf379af46d79e23fbec5ffca19509
-
SSDEEP
384:WZF0z9VgnB7iKNddKVQyJb6k4J5D6GwGBCIw:WZF0zTgnBZdd7yJbgX3EN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1704-132-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "746846549" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bf0e2f08ccd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b067002f08ccd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{568058EB-37FB-11ED-A0EE-F63A18EFECFD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985224" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30985224" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "746846549" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000f6a8c7eecd947b763632a414f32383789c4ce3e6888e5eb59be6415e41d359a4000000000e80000000020000200000000ad97e68cdd5eecbedb69e1b2056d79486aa45c16c0a6fd3a8231fee0f976395200000007d2519a88be04e7366b8c27ce834b80f891a36be412e63ec77a5fb1c715f98a740000000dd0ac441f8c1db8b509d89db50970a231a7f0044ef439286b6a424f0735f5665a45569580b6ba7d10e888bc3a054811e3068b048242c44cd62c209d1d77167c1 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d7906000000000200000000001066000000010000200000008e8d974f86828844f5ab6f60346a5a1bf84e8b17dc0bf31ef762c7128bfd8b0d000000000e80000000020000200000001b128b245b440a2843bdc373bb94d39ee7e02a0d56a3957117bb8afa37bb24c5200000002d86c4465a9fca8044e13627535b80de35cebec4d8877541bf522fcceccb37aa400000005ed4bfba9c9cda041ce0ae0b6aced7250400e47f8edd5ff352f39779f550e1caaeb8f62f0aad7b25204b02036dfdc347652d17f680079fba78fac8ebd0015693 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "770752431" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370343793" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1704 75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe 1704 75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe 1704 75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe 1704 75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4332 iexplore.exe 4332 iexplore.exe 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4332 1704 75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe 98 PID 1704 wrote to memory of 4332 1704 75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe 98 PID 4332 wrote to memory of 3740 4332 iexplore.exe 100 PID 4332 wrote to memory of 3740 4332 iexplore.exe 100 PID 4332 wrote to memory of 3740 4332 iexplore.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe"C:\Users\Admin\AppData\Local\Temp\75f0869a82f31c20f5dedb5a3de531680b1c3635f105a8758ae55c0a2ac9343e.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.download787.com/sanity.php?1=149121-100002⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4332 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3740
-
-