Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe
Resource
win7-20220812-en
General
-
Target
97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe
-
Size
257KB
-
MD5
6c223895ea905ce600d0181250f29b39
-
SHA1
6f5f13a5ea5c383c7531786e5ded485ba80b6303
-
SHA256
97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb
-
SHA512
3a588cef72037a160a54f6ac82d24d258dfb71485881f87a3e654996509373d1d3b970757dbdecd0bf5296f6662e463551d50941ef25bf833cecfad3501368c3
-
SSDEEP
3072:Oxd5qdyipX2MB46XN0MKFkAFXrKnYhbwIz3qsuegTqAxMJSvbYjAo6fEuOHCBIv/:Oxdo3cMBrARnhbwIz6sOHiJob6AFdq
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000022f6d-133.dat acprotect behavioral2/files/0x000c000000022f6d-134.dat acprotect behavioral2/files/0x000c000000022f6d-139.dat acprotect -
Blocklisted process makes network request 6 IoCs
flow pid Process 12 4740 rundll32.exe 29 4740 rundll32.exe 37 4740 rundll32.exe 38 4740 rundll32.exe 40 4024 rundll32.exe 43 4024 rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000022f6d-133.dat upx behavioral2/files/0x000c000000022f6d-134.dat upx behavioral2/memory/4740-135-0x0000000000010000-0x000000000003C000-memory.dmp upx behavioral2/memory/4740-136-0x0000000000010000-0x000000000003C000-memory.dmp upx behavioral2/files/0x000c000000022f6d-139.dat upx behavioral2/memory/4024-140-0x0000000000010000-0x000000000003C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe -
Loads dropped DLL 2 IoCs
pid Process 4740 rundll32.exe 4024 rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4236 4740 WerFault.exe 80 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2742832646" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985331" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30985331" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2742832646" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985331" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CD4B6259-3866-11ED-AECB-D2A4FF929712} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2776739910" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 760 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 760 IEXPLORE.EXE 760 IEXPLORE.EXE 3940 IEXPLORE.EXE 3940 IEXPLORE.EXE 3940 IEXPLORE.EXE 3940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4740 2320 97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe 80 PID 2320 wrote to memory of 4740 2320 97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe 80 PID 2320 wrote to memory of 4740 2320 97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe 80 PID 4740 wrote to memory of 4976 4740 rundll32.exe 92 PID 4740 wrote to memory of 4976 4740 rundll32.exe 92 PID 4740 wrote to memory of 4976 4740 rundll32.exe 92 PID 4976 wrote to memory of 760 4976 iexplore.exe 93 PID 4976 wrote to memory of 760 4976 iexplore.exe 93 PID 760 wrote to memory of 3940 760 IEXPLORE.EXE 94 PID 760 wrote to memory of 3940 760 IEXPLORE.EXE 94 PID 760 wrote to memory of 3940 760 IEXPLORE.EXE 94 PID 4740 wrote to memory of 2660 4740 rundll32.exe 95 PID 4740 wrote to memory of 2660 4740 rundll32.exe 95 PID 2660 wrote to memory of 4024 2660 RunDll32.exe 96 PID 2660 wrote to memory of 4024 2660 RunDll32.exe 96 PID 2660 wrote to memory of 4024 2660 RunDll32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe"C:\Users\Admin\AppData\Local\Temp\97f26035c413ecce80e0c77e78f9881f93f8fa46b8c3d73c8ab3b52ee4b38ddb.exe"1⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysTem32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\strFileDestVar1.cpl"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 9443⤵
- Program crash
PID:4236
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:760 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3940
-
-
-
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\strFileDestVar1.cpl"3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\strFileDestVar1.cpl"4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4024
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4740 -ip 47401⤵PID:3836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5520071a63bb5e2038486cd0ce14055b1
SHA1752cfb61bbe3ae1e2c2609c53aeee510661a59ed
SHA256f8a989e9cf1fe0f0000c795537122a3c727e3b570b66582bfb62d9bbae4b20f8
SHA5126f0131c9e0943c6a13d52a7525e1c592c95db868bf2dd21a8a37254150a239748985cc31518d0c4844bebfc5613feee6857b5debfbbbd6ed4539cd5e494ebbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5417f24c08a23795bef51ab50d45b7d2a
SHA1dd6e565e168963050a4568b07766cb3121113bd2
SHA256bd4849763e0347a43aeecc927daa9290256bbbcd579ba89cb17cc27d6fc4196d
SHA512da2213265370faac37be45f9a6e0f99d0c79ae5d6da31125fd4e0f4dc1c17f77621e88fca39bc2177c933d8e3e99785b1b5fb75dc642f9cf05dd26583725d3e1
-
Filesize
57KB
MD53b8daad17fc3576b7ce42bd8e88eb40f
SHA1de9610ea1cb66036241155b678696099cb2816dd
SHA25623dbd9d60a2c06a3d47b9abbe7800ce0e3d067e373724c175049aeb853fddd0c
SHA51277573a6b6ba7ab46129f5191dcf9e204484dfa012a59ac5536aa7f74f63f6bee8213a36e0603ca4a836be9f983941444db2ef73573435e122dd1fea35fac593a
-
Filesize
57KB
MD53b8daad17fc3576b7ce42bd8e88eb40f
SHA1de9610ea1cb66036241155b678696099cb2816dd
SHA25623dbd9d60a2c06a3d47b9abbe7800ce0e3d067e373724c175049aeb853fddd0c
SHA51277573a6b6ba7ab46129f5191dcf9e204484dfa012a59ac5536aa7f74f63f6bee8213a36e0603ca4a836be9f983941444db2ef73573435e122dd1fea35fac593a
-
Filesize
57KB
MD53b8daad17fc3576b7ce42bd8e88eb40f
SHA1de9610ea1cb66036241155b678696099cb2816dd
SHA25623dbd9d60a2c06a3d47b9abbe7800ce0e3d067e373724c175049aeb853fddd0c
SHA51277573a6b6ba7ab46129f5191dcf9e204484dfa012a59ac5536aa7f74f63f6bee8213a36e0603ca4a836be9f983941444db2ef73573435e122dd1fea35fac593a