Analysis
-
max time kernel
131s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 09:15
Static task
static1
Behavioral task
behavioral1
Sample
2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe
Resource
win10v2004-20220812-en
General
-
Target
2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe
-
Size
675KB
-
MD5
c1a65ec784bcabdef10796e9bd86b4bd
-
SHA1
2dec5b8eeffd7568e6a3f9b318f42deb06a83d9d
-
SHA256
2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa
-
SHA512
b0be3db29c72b0dd51539b1198cee34210ab90826702bc3aed26ea35eb12986b164d6b5ec0f3bd3177f8b2dd0494b53252856ec7316781cbf0f5cb8a224938ad
-
SSDEEP
12288:kJ0p6T06/rm6agttTknjkxCdDLAvzVPN0CdPnW2spi7RrWYO+ijN:km6H/SSjMyvzVWf27kYLg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DesktopLightning = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe" 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe 3528 2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe"C:\Users\Admin\AppData\Local\Temp\2ebe04470894c913375fda7b983434187e054a8f1721e1e30eeeef6d8efbceaa.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3528