Analysis
-
max time kernel
97s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
58f076fae763cce89761b9cec55e7326613a5c72dfd94767ede0f5816778ee94.vbs
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
58f076fae763cce89761b9cec55e7326613a5c72dfd94767ede0f5816778ee94.vbs
Resource
win10v2004-20220812-en
General
-
Target
58f076fae763cce89761b9cec55e7326613a5c72dfd94767ede0f5816778ee94.vbs
-
Size
348B
-
MD5
a59d9b06c36994b49e0b152dd1452d9c
-
SHA1
b6c11806f3bf58f49fb54eab376b07f9ae05a690
-
SHA256
58f076fae763cce89761b9cec55e7326613a5c72dfd94767ede0f5816778ee94
-
SHA512
41f5f8bd9a6d4c4608ed3b63af8da02a6a4201500e050609a96c405ccf8697bbdff17fbbbe8887e8372fdb32c4494dcf8edf88397a41a9548473b975953412c4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a000000000200000000001066000000010000200000001c2831400698c68071d0413d79dd1494966e0ac2d7cbd957351beaad6c3b65f4000000000e8000000002000020000000ae190e79670ee590d2600be9b4928803ff311a5b34d46cc5faed48ce3a8e356820000000d37a449a37dffed259328d548de9a091c5e4ea3f84dfedecc51b25f9f5a2eee140000000d4be2c3c81f056ce9cd553bfa1027b798f44c531c34a747fb05cb3c05196e784e73e2857fd5abaf45d7a77fad2d7742d09eeb1d4abeb9ac830bbefb92f4327c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370398317" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B8E83B1-387A-11ED-9D78-7225AF48583A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0735f3187ccd801 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 640 IEXPLORE.EXE 640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2044 1204 WScript.exe 27 PID 1204 wrote to memory of 2044 1204 WScript.exe 27 PID 1204 wrote to memory of 2044 1204 WScript.exe 27 PID 2044 wrote to memory of 1516 2044 cmd.exe 29 PID 2044 wrote to memory of 1516 2044 cmd.exe 29 PID 2044 wrote to memory of 1516 2044 cmd.exe 29 PID 1204 wrote to memory of 584 1204 WScript.exe 30 PID 1204 wrote to memory of 584 1204 WScript.exe 30 PID 1204 wrote to memory of 584 1204 WScript.exe 30 PID 1204 wrote to memory of 1336 1204 WScript.exe 32 PID 1204 wrote to memory of 1336 1204 WScript.exe 32 PID 1204 wrote to memory of 1336 1204 WScript.exe 32 PID 1204 wrote to memory of 632 1204 WScript.exe 34 PID 1204 wrote to memory of 632 1204 WScript.exe 34 PID 1204 wrote to memory of 632 1204 WScript.exe 34 PID 1516 wrote to memory of 640 1516 iexplore.exe 37 PID 1516 wrote to memory of 640 1516 iexplore.exe 37 PID 1516 wrote to memory of 640 1516 iexplore.exe 37 PID 1516 wrote to memory of 640 1516 iexplore.exe 37
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\58f076fae763cce89761b9cec55e7326613a5c72dfd94767ede0f5816778ee94.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C start /min iexplore http://www.dao234.com/index2.html?pc55662⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.dao234.com/index2.html?pc55663⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:640
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C .\tool.cmd2⤵PID:584
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C .\360.cmd2⤵PID:1336
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C .\fav\fav.cmd2⤵PID:632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5c471d44f7e8d82642c42979c3c2096fb
SHA1e35110421a65bf6a73de62abd1f4b774a733de1f
SHA256fdb2dcca4f3e084aada467cfbc88c696dc2e9e5dea7fb2d3c54e81b070b0e946
SHA512b6e30f0e50b7dbfd272f39c897cee0ab2652c53b4e4d2be3ef729a6c10deb2aa38e7858cb235bd4b9c5e611a71d05c442c70ff631a44b90b7b1941965515da61