Analysis
-
max time kernel
141s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 07:44
Static task
static1
Behavioral task
behavioral1
Sample
72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe
Resource
win10v2004-20220812-en
General
-
Target
72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe
-
Size
176KB
-
MD5
666637837fff2837d0c798b0bc411160
-
SHA1
af62c162cf8879b5c99bc2c61a414c11f164e491
-
SHA256
72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4
-
SHA512
b31bc979b5cdf21e448a8d31d606476876da939eb034c0c71f44731e4959c9c3e6ab2a701455d8349c847b13709aded47ba77749122ff4b796b095801c0e765e
-
SSDEEP
3072:XogIIJPyeiKKop5TosVv/jKufybA2d26csLGVoQF9Wu:Xogu8VNosZ/jud2lWu
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1692 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.qq5.com/?gg" 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: 33 1532 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1532 AUDIODG.EXE Token: 33 1532 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1532 AUDIODG.EXE Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1972 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 28 PID 1664 wrote to memory of 1972 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 28 PID 1664 wrote to memory of 1972 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 28 PID 1664 wrote to memory of 1972 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 28 PID 1664 wrote to memory of 1692 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 31 PID 1664 wrote to memory of 1692 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 31 PID 1664 wrote to memory of 1692 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 31 PID 1664 wrote to memory of 1692 1664 72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe"C:\Users\Admin\AppData\Local\Temp\72b3e6909fec6e4c5a8b54fb34f62057e14658872157ccaf4ad6541833f818c4.exe"1⤵
- Drops file in Drivers directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1972
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\yyyy.bat2⤵
- Deletes itself
PID:1692
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4781⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD56eb23c7e6db50b38471251b3046e17a0
SHA12a957f3d7b726e08db4d4b8768352d334650777b
SHA2562e21a09726f43b3685cd0f7e9689c56b7a2e6d496edad56d5e2115e58897480d
SHA5120cc84e346440a5009c0da1a7807f3ad070f73e63d6919bc4b4fce2c8e98afd2368274ed1533ca22a5c4beb058f3812c56a81b2aa059bc16fb64f1b5571c7d6ea
-
Filesize
337B
MD5cad0ad058a01402942c90fc351e44a90
SHA1578e70c3e793934e3673cbd24e49810048a21c83
SHA2565cb09abe8213c1b44827fd894aba8f5b7b714aeccf6a8959cd2da84a39b0429b
SHA512e51e8b49e1d2055ad18b30f2f5d7cfb47e900c5427396d18897e2ef1b464b71a95c64d53fd6584b6483f24799667e337f1b9a15c3dd4f11e8dabb6ab79aebe37