Analysis
-
max time kernel
110s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe
Resource
win10v2004-20220901-en
General
-
Target
dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe
-
Size
1MB
-
MD5
650b624d0ef2f2293049adcb28c9ebae
-
SHA1
7704d2a2cb4888e160094b5121956917bfbe0f69
-
SHA256
dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2
-
SHA512
fbcb3794ef11f10397258b56ba851fb2e18ae1aae937886147b38b94745dfebbf7b9414901ceb530fc2db4a251b46b70d4f5e45c810fe76185d993e9b185c7d2
-
SSDEEP
24576:8RmJkcoQricOIQxiZY1iaNMKvX8rSFl2F1tbJMiU0TAW6:pJZoQrbTFZY1iaNMBR7TMFkAN
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exedescription pid process target process PID 1080 set thread context of 1692 1080 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000005abb90480e62706ea79784ff12537724d7e1345b6338f4c820ddc6e634573df4000000000e8000000002000020000000ab809f85b62f6dbd2bc8dc2cef401d053cccd5dcfdf9e65f5d51d29252a45cfc20000000f20e3090b8c55c7a05da671c4cc84dbc6715da8e7fc3f96f418d6fe50030db9c4000000021d46081ece57ea51f8447e7fb569424118b18f35700ae57b29752d7f0626d0f3923d790e00992d9616df34c003be7f5b8ca74c7848e9cbba98ea4e4fffcd8b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F2509F1-42A1-11ED-A993-42FEA5F7B9B2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0eb6c89aed6d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a30000000002000000000010660000000100002000000033bb4b1cbcbb661153e1c15d23d60df88b0918688350bf8383cddb698922239b000000000e800000000200002000000076829559ccadc52a780f32975038429e5299353c2965146fb8f245ccc75a450a90000000b6e185383c7a1a0d7ed4a032a366618fadc4185fbc08fb1fe684ba9cf355485832529e136cf0fdf4a569443c6e33203c4bae0f65563fb572cea1f1ee61bf206a9dc6a57267ce7b4a63745364948c68940d60a8c5a6c1b7dc825a06318af3b9095974e9e53cc744dd334ac1c669db44a1dc6402bddbe0df66f8ffff57dda0881fa30f5abaaaa8119b9f6ac7bc27e164d540000000c85ba399f495cc3183b514494e62a970aafb43862e035d3d751ebda7fc80cfabe4688aa35063df3017bee4859c05d35ccb1f063e12c8e9ac94af9c9b4eb5e148 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371514729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1764 iexplore.exe 1764 iexplore.exe 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exedd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exeiexplore.exedescription pid process target process PID 1080 wrote to memory of 1692 1080 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe PID 1080 wrote to memory of 1692 1080 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe PID 1080 wrote to memory of 1692 1080 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe PID 1080 wrote to memory of 1692 1080 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe PID 1080 wrote to memory of 1692 1080 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe PID 1080 wrote to memory of 1692 1080 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe PID 1692 wrote to memory of 1764 1692 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe iexplore.exe PID 1692 wrote to memory of 1764 1692 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe iexplore.exe PID 1692 wrote to memory of 1764 1692 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe iexplore.exe PID 1692 wrote to memory of 1764 1692 dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe iexplore.exe PID 1764 wrote to memory of 1536 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1536 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1536 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1536 1764 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe"C:\Users\Admin\AppData\Local\Temp\dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe"
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exeC:\Users\Admin\AppData\Local\Temp\dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=dd3449650d2ffc0a3f66fe92693c5de66de7983b356819e9ec34567f81e396c2.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:2
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\F3ZBIXXR.txtFilesize
608B
MD55ddddcc837fcace18544a6dbf1fdc196
SHA17bb1023ac723d06b7b60d55fa5545637f43f7126
SHA256f1ba09e1192048d800e6d5b08da8ed56af5cf7e99eba6da71f70b6ea43a66765
SHA512f3bf5c0b47324db623f0f405aabe55ecc665f69914d4b0792bf335c88d04b2533e4f71d593f49a4dc72b6195b13de1a8a0f06afc4b53b8b4770dc05f9532d3be
-
memory/1080-54-0x0000000076411000-0x0000000076413000-memory.dmpFilesize
8KB
-
memory/1692-55-0x00000000000C0000-0x0000000000102000-memory.dmpFilesize
264KB
-
memory/1692-58-0x00000000000FD99E-mapping.dmp
-
memory/1692-57-0x00000000000C0000-0x0000000000102000-memory.dmpFilesize
264KB
-
memory/1692-60-0x00000000000C0000-0x0000000000102000-memory.dmpFilesize
264KB
-
memory/1692-62-0x00000000000C0000-0x0000000000102000-memory.dmpFilesize
264KB