Analysis
-
max time kernel
139s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe
Resource
win10v2004-20220901-en
General
-
Target
f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe
-
Size
176KB
-
MD5
6f54d7722ca6a0906249639f67410630
-
SHA1
a2bc7b87ed2c1236dcd143487d81d163139b5c27
-
SHA256
f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82
-
SHA512
37197fa32ea9a677b5b1b6538517d947344ecfeda13e9323a1811b2c079ccbe229b28a6441abcbe05673a4f8633396c66653d6bcada2c2d8b669f5f05f03701d
-
SSDEEP
3072:30vSGZzyT8MH10s20JbcukC2U/mee5D8xv8WX1VfwGkQVoQF9T:EvxlMBbmei83wkT
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1056 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.365j.com/?gg" f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: 33 1756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1756 AUDIODG.EXE Token: 33 1756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1756 AUDIODG.EXE Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe Token: SeShutdownPrivilege 1948 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1948 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 26 PID 1376 wrote to memory of 1948 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 26 PID 1376 wrote to memory of 1948 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 26 PID 1376 wrote to memory of 1948 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 26 PID 1376 wrote to memory of 1056 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 29 PID 1376 wrote to memory of 1056 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 29 PID 1376 wrote to memory of 1056 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 29 PID 1376 wrote to memory of 1056 1376 f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe"C:\Users\Admin\AppData\Local\Temp\f949e97afba38c3ac1a2bf0116a5164a00a199541c5985d9273ec561fec34c82.exe"1⤵
- Drops file in Drivers directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yyyy.bat2⤵
- Deletes itself
PID:1056
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD50cbb8baf2adbf09a708256e6e61666d4
SHA1bf2e8a7283d8ce1fbb633eae255cf6910abfaff0
SHA256c2d451184b5f13d14e941701e9d74fb0cf9f90253319f31fcbcde6933ba24e8a
SHA512cbabafc429efdf17db6a1a1ee5ee09ce692a9695b51869af55eb90fec6602e40bf23d90f42657c35a1b5ddd1ba6615eebff42e642f5bd1947c6f6cd23eebf6d2
-
Filesize
337B
MD5eaf01aa7e40691254214fa00a9009a0a
SHA1efb57d5fd907acc6953805e45bd400206e76f6ad
SHA256b059603e4e964df176ab753090da48da3175cce046ace1b39664ab86304fd4a5
SHA512a4863931646cdc3954c7a473fec3406095eff9e86802441152c3fc0772f77e9df3a193c4fb4a999079e78fa8330fd515ddb7ce67ce6e29095563bdaf2661e2db