Analysis
-
max time kernel
93s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 14:28
Behavioral task
behavioral1
Sample
8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe
Resource
win10v2004-20220812-en
General
-
Target
8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe
-
Size
1012KB
-
MD5
f8beac0e01d18f8f99dc17ee812231f7
-
SHA1
19b9d587e78e0f9e795bed431554de65d005f914
-
SHA256
8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203
-
SHA512
dc4a43a95bafe4ea2ad8b2bcb4c38c22fbd5a3ef7958a7817016d5ddf6e6363c319ceb5b5b1adae65f28811707c2e3b4cdfbd36e4c634584db3e3cf4ece3de25
-
SSDEEP
24576:8PatCg7EPimZG63cCEpshK9pnCmkm/30bCv/usIKc7af5fuU8:vtV7EPimD3c8dmw6TVTRfu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 272 FGSetup.exe -
resource yara_rule behavioral1/memory/980-55-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/files/0x000a0000000122cd-56.dat upx behavioral1/files/0x000a0000000122cd-58.dat upx behavioral1/files/0x000a0000000122cd-60.dat upx behavioral1/memory/272-62-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/980-63-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral1/memory/272-65-0x0000000000400000-0x00000000004A2000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/980-55-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral1/memory/272-62-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral1/memory/980-63-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe behavioral1/memory/272-65-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370395838" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000cd38c51c03f47edef11b3919cd7c7c7028731e6d61b56b5afa78fb774d239ec1000000000e80000000020000200000009939329a6773b553be6cb7072b1413aaca9b5b646ae8209da0c34ee58f29206f20000000183701a941e4316bfe28238d3423176df83a93c3d66c475107db6e3c1c7336a34000000018ba38e4890bd9ca01d49404d659bbaf23c069eb3ad28857e531fcb384606d1e7d04754b66334f5bd84b79d718f27cf74b4bb50784546336b4a559be514f9f2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209e9d6781ccd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77385E11-3874-11ED-93F0-EAF6071D98F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 272 FGSetup.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 272 FGSetup.exe 272 FGSetup.exe 272 FGSetup.exe 624 iexplore.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 272 FGSetup.exe 272 FGSetup.exe 272 FGSetup.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 624 iexplore.exe 624 iexplore.exe 584 IEXPLORE.EXE 584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 980 wrote to memory of 272 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 28 PID 980 wrote to memory of 272 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 28 PID 980 wrote to memory of 272 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 28 PID 980 wrote to memory of 272 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 28 PID 980 wrote to memory of 272 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 28 PID 980 wrote to memory of 272 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 28 PID 980 wrote to memory of 272 980 8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe 28 PID 624 wrote to memory of 584 624 iexplore.exe 31 PID 624 wrote to memory of 584 624 iexplore.exe 31 PID 624 wrote to memory of 584 624 iexplore.exe 31 PID 624 wrote to memory of 584 624 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe"C:\Users\Admin\AppData\Local\Temp\8dc952f6a2a8f63028b259b243e6c36e0a21fc25ec81b757d93c46c15049b203.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\FGSetup.exeC:\Users\Admin\AppData\Local\Temp\FGSetup.exe "DE"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:272
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD56b21a2b5bb19744d0ba46269c650769d
SHA1592d547c8c47f53ec55da3f05878294fee6a1c12
SHA256c4a798fd0828571ecd183ec88da655c5eb0fed75568002dbea6898c7fa05f516
SHA5120ad276503f68fcea233a15c1831a1ff26d1875626b86dc26ea83df30266ec3e3ca22940a2e34511c6584535d413627f6cc09b78c3c424f896e50b6fd547a674b
-
Filesize
757KB
MD5adc0ad8828846de3c6ae5cca1c545b18
SHA140806f0616ea44553e1d5a5e3a545bac3ebac3b9
SHA2560bbe59f2023d06ebb69cecfe207aaa25d02473f3838ab43e96b2a47024c47c53
SHA51227f5b3a941568669d29c991cbf9e3ccf7bc64ccac36b90d54c5a9b2365b60f0c6c22370fd0d8fedf7532a7617d62be5a4f20f77399f7a8c60c2ddbe3bf4ef032
-
Filesize
757KB
MD5adc0ad8828846de3c6ae5cca1c545b18
SHA140806f0616ea44553e1d5a5e3a545bac3ebac3b9
SHA2560bbe59f2023d06ebb69cecfe207aaa25d02473f3838ab43e96b2a47024c47c53
SHA51227f5b3a941568669d29c991cbf9e3ccf7bc64ccac36b90d54c5a9b2365b60f0c6c22370fd0d8fedf7532a7617d62be5a4f20f77399f7a8c60c2ddbe3bf4ef032
-
Filesize
608B
MD5f2ee14cafc0fdb5b9890c07ffd7a2807
SHA134800c0a7b248570d23ee8ed14a64d6f380efe69
SHA2560cee7f5b08d86d9230956bf263d77177ea49df72ef30fea1b84c40486d8ad94c
SHA51274fd1f0164de1ce2feb4dee50b3755acff74cefa96dc1276ffc1e34d517e633be62151ef0873ec292ffa0f89cf2a4ee67717cc7761f024db86f6b7f78bbc3c84
-
Filesize
757KB
MD5adc0ad8828846de3c6ae5cca1c545b18
SHA140806f0616ea44553e1d5a5e3a545bac3ebac3b9
SHA2560bbe59f2023d06ebb69cecfe207aaa25d02473f3838ab43e96b2a47024c47c53
SHA51227f5b3a941568669d29c991cbf9e3ccf7bc64ccac36b90d54c5a9b2365b60f0c6c22370fd0d8fedf7532a7617d62be5a4f20f77399f7a8c60c2ddbe3bf4ef032