Analysis
-
max time kernel
98s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
9fb255bc2327109353925317d4e88727898c289fa1d9b896860332c12ffc11a3.vbs
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9fb255bc2327109353925317d4e88727898c289fa1d9b896860332c12ffc11a3.vbs
Resource
win10v2004-20220812-en
General
-
Target
9fb255bc2327109353925317d4e88727898c289fa1d9b896860332c12ffc11a3.vbs
-
Size
333B
-
MD5
319f566c783934ec0e00ed7fef4fe91d
-
SHA1
f7d5006da82aed0612a05b5042e19b88d75290b2
-
SHA256
9fb255bc2327109353925317d4e88727898c289fa1d9b896860332c12ffc11a3
-
SHA512
33866a6e168b6d879b9920da5ee8767b7b3d7189e78c984220975e689b88de5cf6a764da2df853f0c1a5a2d02e03aedcb7585c1c1164a4d3f99b503e07f074ee
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370364014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a0000000002000000000010660000000100002000000067e26579a01debe88641e5ac541ab9518184182201598165bed839c034a7bd54000000000e800000000200002000000008e2a0c11523ad1eff6cb7450fd84b34a36f9fd034e75a32390b7a376ac27c792000000099f1f9a3699a6238873ed9ce52e6f8c2751f7e0b38a627792a73aa303699d39e400000008c1f96774238dc3066c3e2f3b16b986419093063a33693b38dec166b2be79811e767dbbf22f581badd3c779d68d489b4ee2684f2344d0e2bea8f93f834b261ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D487381-382A-11ED-B4FB-76D99E3F6056} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60be335237ccd801 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1380 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1380 iexplore.exe 1380 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1444 wrote to memory of 844 1444 WScript.exe 27 PID 1444 wrote to memory of 844 1444 WScript.exe 27 PID 1444 wrote to memory of 844 1444 WScript.exe 27 PID 844 wrote to memory of 1380 844 cmd.exe 29 PID 844 wrote to memory of 1380 844 cmd.exe 29 PID 844 wrote to memory of 1380 844 cmd.exe 29 PID 1444 wrote to memory of 880 1444 WScript.exe 30 PID 1444 wrote to memory of 880 1444 WScript.exe 30 PID 1444 wrote to memory of 880 1444 WScript.exe 30 PID 1444 wrote to memory of 1188 1444 WScript.exe 32 PID 1444 wrote to memory of 1188 1444 WScript.exe 32 PID 1444 wrote to memory of 1188 1444 WScript.exe 32 PID 1444 wrote to memory of 1868 1444 WScript.exe 34 PID 1444 wrote to memory of 1868 1444 WScript.exe 34 PID 1444 wrote to memory of 1868 1444 WScript.exe 34 PID 1380 wrote to memory of 2044 1380 iexplore.exe 37 PID 1380 wrote to memory of 2044 1380 iexplore.exe 37 PID 1380 wrote to memory of 2044 1380 iexplore.exe 37 PID 1380 wrote to memory of 2044 1380 iexplore.exe 37
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9fb255bc2327109353925317d4e88727898c289fa1d9b896860332c12ffc11a3.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C start /min iexplore http://447.cc/index2.html?121xia2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://447.cc/index2.html?121xia3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C .\to.cmd2⤵PID:880
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C .\copy.cmd2⤵PID:1188
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C .\run.cmd2⤵PID:1868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5bda3368dd4cfdc362befb3ae56289588
SHA165ad9b2f13ff09f8326de64331151e13a2c09536
SHA256dff56c8b44eb6ca1fcef2b32ab4e423ff5dce4d3f0542b2fb3ba208e75bf4b96
SHA5122ce33cc8c8e77dc97d38477e11bb76ef2e923b71321bec21a61927a4bab7e8fbf00458683f2c85f6091cc9df615afaf8908bf9f870a30057b64b0d7c343052b0