Analysis
-
max time kernel
137s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe
Resource
win7-20220812-en
General
-
Target
474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe
-
Size
449KB
-
MD5
079d733f2cfde87a696f05f746f16200
-
SHA1
c5f5726cfcd96347c01b163c1e6f84eeb0eea841
-
SHA256
474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219
-
SHA512
6edba0c78c6bb349209b2ddb2b604cff26ffd267bfdc987f3ff6de86c8e0c606f633dcc3c7ecd7dc8ced2af374c5f6ec9aa5bb8d702bece0f3f459c2775c263d
-
SSDEEP
12288:btcZiSnQDRwnzDhJmFur16KKMN+uCrTevQ:bUnUo+up6KKMsuCr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4936 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe 4456 DesktopLayer.exe -
resource yara_rule behavioral2/memory/4936-137-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4936-140-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4456-143-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxF84F.tmp 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1017700589" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5D78CF2A-41C3-11ED-AECB-5A10AEE59B4B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1017700589" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987728" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987728" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371419270" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4456 DesktopLayer.exe 4456 DesktopLayer.exe 4456 DesktopLayer.exe 4456 DesktopLayer.exe 4456 DesktopLayer.exe 4456 DesktopLayer.exe 4456 DesktopLayer.exe 4456 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 360 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 360 iexplore.exe 360 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4936 2112 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe 82 PID 2112 wrote to memory of 4936 2112 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe 82 PID 2112 wrote to memory of 4936 2112 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe 82 PID 4936 wrote to memory of 4456 4936 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe 83 PID 4936 wrote to memory of 4456 4936 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe 83 PID 4936 wrote to memory of 4456 4936 474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe 83 PID 4456 wrote to memory of 360 4456 DesktopLayer.exe 84 PID 4456 wrote to memory of 360 4456 DesktopLayer.exe 84 PID 360 wrote to memory of 2920 360 iexplore.exe 85 PID 360 wrote to memory of 2920 360 iexplore.exe 85 PID 360 wrote to memory of 2920 360 iexplore.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe"C:\Users\Admin\AppData\Local\Temp\474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exeC:\Users\Admin\AppData\Local\Temp\474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:360 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD517efb7e40d4cadaf3a4369435a8772ec
SHA1eb9302063ac2ab599ae93aaa1e45b88bbeacbca2
SHA256f515564b67efd06fa42f57532feafc49d40b0fc36c5d4935300dd55416f0a386
SHA512522fba06304950860fa9aa8933b12b9323dea47dbda363db3f57535396c156c4cf6934a9db38fff8c77503fcb889d030fadb639094a1f34bbad54c79c8734450
-
Filesize
52KB
MD517efb7e40d4cadaf3a4369435a8772ec
SHA1eb9302063ac2ab599ae93aaa1e45b88bbeacbca2
SHA256f515564b67efd06fa42f57532feafc49d40b0fc36c5d4935300dd55416f0a386
SHA512522fba06304950860fa9aa8933b12b9323dea47dbda363db3f57535396c156c4cf6934a9db38fff8c77503fcb889d030fadb639094a1f34bbad54c79c8734450
-
C:\Users\Admin\AppData\Local\Temp\474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe
Filesize52KB
MD517efb7e40d4cadaf3a4369435a8772ec
SHA1eb9302063ac2ab599ae93aaa1e45b88bbeacbca2
SHA256f515564b67efd06fa42f57532feafc49d40b0fc36c5d4935300dd55416f0a386
SHA512522fba06304950860fa9aa8933b12b9323dea47dbda363db3f57535396c156c4cf6934a9db38fff8c77503fcb889d030fadb639094a1f34bbad54c79c8734450
-
C:\Users\Admin\AppData\Local\Temp\474163e14dada25e6630e81d1342677ab37c26fe6c1a6700f0ed0d19a0b00219Srv.exe
Filesize52KB
MD517efb7e40d4cadaf3a4369435a8772ec
SHA1eb9302063ac2ab599ae93aaa1e45b88bbeacbca2
SHA256f515564b67efd06fa42f57532feafc49d40b0fc36c5d4935300dd55416f0a386
SHA512522fba06304950860fa9aa8933b12b9323dea47dbda363db3f57535396c156c4cf6934a9db38fff8c77503fcb889d030fadb639094a1f34bbad54c79c8734450