Analysis
-
max time kernel
98s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe
Resource
win10v2004-20220812-en
General
-
Target
8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe
-
Size
1.1MB
-
MD5
074bc39c1fc0a58e804788fa8c974500
-
SHA1
020f20ea68ce286d9dc269906b0e6a7839921d27
-
SHA256
8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2
-
SHA512
397755e0e73b82efd973c0e60b4a356ae4b9dfaff6c76e54406fbed9d8558a860d5fa270d5fdc9c27611b29d89279aedef184d715aff4fb73eba9ed106fa68c9
-
SSDEEP
24576:dWvknOMEf3aBO5QEEQA5VgbN7HR5DeDmMxmNQp++QLEZ/+1:dUeOMmKBwZEQhbN7HRAK/7nLEZ/+1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3252 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 972 wrote to memory of 3252 972 8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe 81 PID 972 wrote to memory of 3252 972 8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe 81 PID 972 wrote to memory of 3252 972 8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe"C:\Users\Admin\AppData\Local\Temp\8a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\a25ZVKfm15\68V6hx9B\Setup.exeC:\Users\Admin\AppData\Local\Temp\a25ZVKfm15\68V6hx9B\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:3252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5074bc39c1fc0a58e804788fa8c974500
SHA1020f20ea68ce286d9dc269906b0e6a7839921d27
SHA2568a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2
SHA512397755e0e73b82efd973c0e60b4a356ae4b9dfaff6c76e54406fbed9d8558a860d5fa270d5fdc9c27611b29d89279aedef184d715aff4fb73eba9ed106fa68c9
-
Filesize
1.1MB
MD5074bc39c1fc0a58e804788fa8c974500
SHA1020f20ea68ce286d9dc269906b0e6a7839921d27
SHA2568a98cb34ee5b19615930b61d89047462a450f6052322213b7e2d75549f58b4a2
SHA512397755e0e73b82efd973c0e60b4a356ae4b9dfaff6c76e54406fbed9d8558a860d5fa270d5fdc9c27611b29d89279aedef184d715aff4fb73eba9ed106fa68c9