Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe
Resource
win10v2004-20220812-en
General
-
Target
79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe
-
Size
31KB
-
MD5
5634c26547f99381e5c869ca8eeb2a6d
-
SHA1
8f845c886e2ac2d832bbec8ca8dd2b7c0fa63215
-
SHA256
79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c
-
SHA512
2b61b1decb1026d92d16a3710222074fddb703570b2a32b3f20585c70104adfb5846f39cfc0470e686d09c5ab10b1cf653a849c094e6bf7022b1b277388808b1
-
SSDEEP
384:4FZeGeDcU/LexZBAspsIoLCVRlNewBytgzZ9n0YmbsR3DC5qeidoDyomqto7I6ut:4F/BmGZBQWlBC6GAVDC5cdoDyYtYuVS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winmzk32.dll 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe File opened for modification C:\Windows\SysWOW64\winmzk32.dll 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985320" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9CC73C2E-385B-11ED-B696-5A10AEE59B4B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1959960125" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1959960125" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30985320" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370385153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1556 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 81 PID 1492 wrote to memory of 1556 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 81 PID 1492 wrote to memory of 1556 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 81 PID 1556 wrote to memory of 1820 1556 cmd.exe 83 PID 1556 wrote to memory of 1820 1556 cmd.exe 83 PID 1820 wrote to memory of 1376 1820 iexplore.exe 85 PID 1820 wrote to memory of 1376 1820 iexplore.exe 85 PID 1820 wrote to memory of 1376 1820 iexplore.exe 85 PID 1492 wrote to memory of 1820 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 83 PID 1492 wrote to memory of 1820 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 83 PID 1492 wrote to memory of 1820 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 83 PID 1492 wrote to memory of 1820 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 83 PID 1492 wrote to memory of 1820 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 83 PID 1492 wrote to memory of 1820 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 83 PID 1492 wrote to memory of 4608 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 86 PID 1492 wrote to memory of 4608 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 86 PID 1492 wrote to memory of 4608 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 86 PID 1492 wrote to memory of 1656 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 89 PID 1492 wrote to memory of 1656 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 89 PID 1492 wrote to memory of 1656 1492 79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe"C:\Users\Admin\AppData\Local\Temp\79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\gos866B.bat"2⤵PID:4608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.bat"2⤵PID:1656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\79e41ff9b8d7130c0c3fe5454ac96be4b18e25150419ac3eb943d052c850f92c.bat
Filesize361B
MD52de2bb68037c6bc8b2f0c8dab296df36
SHA1bcc3a26758a60d3f388d32193feea0e7b51a1f23
SHA256b49e24032254d8c4b915e44aaa2a7311274240b736d4226132f6f931a9942dac
SHA5123e2755004cb0738239a264931a4c080c7bd04619a73a318fed8f4c1c9c651b392dbb31643ce72436faa238144842d243935e7d209738906b93d1d800da8728b6
-
Filesize
190B
MD58fc4d59f75ec49adeba4ba2226a04f34
SHA1de52ce7e9bd6cd655590110798a0eb226c084a42
SHA256c67597b06c3540cc952c73f1821ca450ac7f76a0ecc3c7d26b5e4518d4ad5468
SHA512f6c8aab876459b2938da507f69a00fd265f67d7453355dd665905914e35f6de25a49f0d5ac3151e2f5bd006638e10d5caad307ff5e230c319bcd544d4d7bafa6
-
Filesize
21KB
MD517eb7c3bc1a7e906d4c80de247298de5
SHA1b3c05ae4e4654ae4a7c9888acbcf0bed59068339
SHA25622cc324f824a38631ac4a1dcf3dd64e4a92695e17c535c450d18ea8dff2f6dd5
SHA5129e63734db68635df4c1201f35d76cabb6f1cf33d0fa43653e46da4cc93f1bc4c0e225d1819185753cb8e78cdf459ffb5d21bbcd5e3213e709bb7ef184d879996
-
Filesize
21KB
MD517eb7c3bc1a7e906d4c80de247298de5
SHA1b3c05ae4e4654ae4a7c9888acbcf0bed59068339
SHA25622cc324f824a38631ac4a1dcf3dd64e4a92695e17c535c450d18ea8dff2f6dd5
SHA5129e63734db68635df4c1201f35d76cabb6f1cf33d0fa43653e46da4cc93f1bc4c0e225d1819185753cb8e78cdf459ffb5d21bbcd5e3213e709bb7ef184d879996