Analysis
-
max time kernel
135s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe
Resource
win10v2004-20220812-en
General
-
Target
1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe
-
Size
14KB
-
MD5
71476ee7b998c7905bcce089c184af17
-
SHA1
773a93cb299aa3bd84b29cda2809d6482b2d808c
-
SHA256
1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e
-
SHA512
d925f1d54077a78b1898eb7179982bfcb6800822ddf4ed7860e12a486abb1b7b8ef1d2c7a33fd634fc052186aed1860418f7bfc2e036f3e99a15ba92eb3b7f57
-
SSDEEP
384:c7Jn8r3Jyv0Kq7NJcAb6q40xs5QuJ1L57U5:2Jn6Zyv0DcDq4IHuzLVi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2087729880" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987997" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987997" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2087729880" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20df7a88ddd6d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371534934" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A6BDAA68-42D0-11ED-AECB-520B3B914C01} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ea8287ddd6d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d9120000000000200000000001066000000010000200000000c15b18f2da9706319e82a4820e646e46afd35493c4be42bdbada6706ed62751000000000e80000000020000200000006327fd04b11086af1ed1a5450650a9706baeb5c3827938a975ce04436edd3d6d2000000042324f3c884b2fbc691333cf13f2c0785e50bc60c6b23801848215a9c27a9df9400000001df78d38f6017e400f26de06307594d6daf95737e1f25a411bbd7ab0ca98383605242b690ffa744dd2187781ae01002a5e9c83e669492f7afab4977611dad3b0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000b06291e1a2ec18dd0a621ab33ffe08aeef8c7bc0fbf37aacb628960d3becc1ce000000000e8000000002000020000000c3e2cc55899d393cfd492ae5733b83140a87d8b95b7d1bb87065a06e68f2b370200000008c926d9c170791c7f761f138fb70245309921a416cb40540c9ac95a5c6aa8d724000000019e042d77372d1b6871314527997da9a434987daf907218f6e965d59b3c0914726647432292d6c89bd771229eed1b8efe204b340d8a14351a485c4d8a06f16c3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2205072459" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2160 1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe 2160 1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe 2160 1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe 2160 1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 396 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 396 iexplore.exe 396 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2160 wrote to memory of 396 2160 1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe 81 PID 2160 wrote to memory of 396 2160 1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe 81 PID 396 wrote to memory of 1988 396 iexplore.exe 83 PID 396 wrote to memory of 1988 396 iexplore.exe 83 PID 396 wrote to memory of 1988 396 iexplore.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe"C:\Users\Admin\AppData\Local\Temp\1f3d377a41bc8b9690f2256727ae983fff9c5035321b2c7ef167ea0822c71f4e.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://a.doginhispen.com/150/in/htmlg2422822176.html?cid=51280403&aid=10383&time=2422822176&fw=64&v=150&m=02⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5fd70739fca5345a28f924f9102ae10ee
SHA16ce3f92183544f3bf52cb76364591589cb940a19
SHA256f238404cc643efddef8ff430f128cdc8ec1513969eaac24b5e5bce81248a91e7
SHA512a787d3a2bceeaed2f2a29f357df6ae17d5b9f66a3c561550d5f83c308ad26a1ddf876488151ff5e51ce93bfb9d0c7b8ca812d595e8d3ebdda7d805707ac1b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD55f0a13237cf0e284456b6f34553efe4f
SHA14de1d275496ab53340cdc1467ea8425f6c3473a7
SHA2568483dbacb63fedd1e1cefd4a13a86111c208bf6d3a0aaeb12f67429f0911ba10
SHA512b90fdbff97f40d33a81ca743a807b35dc1887b6a3e296fae597a278f95b1e51dc59477cbe0918415b082596e7009b9d34eacc7e609b8782908b1d8ccdf541b46