Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe
Resource
win7-20220812-en
General
-
Target
4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe
-
Size
34KB
-
MD5
64b4f3b386da6ba476f04ff381fe8578
-
SHA1
add60248c69f44a8179da31f2955c229afc56085
-
SHA256
4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa
-
SHA512
625bebfc779e81aae65e62248dc22b6a0e707bd630f7e6a320ccaa94acee3bd1ede0ce2e9b5234fe8622ae9f675ee70dfd3ca7adfdd1bc682d542074a12ad96d
-
SSDEEP
384:sLxmTW8saHaThZpcl51cvVGF3UU+v8mxNZJQlODsbNRqLT9npzl+1PeLn5uf1kz5:q78sYqHpy5OcDONMusIpMsmuT/Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 880 WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" WindowsUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395168194" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395168194" RunDll32.exe Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage RunDll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RunDll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RunDll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" RunDll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" RunDll32.exe Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TypedURLs RunDll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" RunDll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Cleared_TIMESTAMP = f0e5ae4c30d8d801 RunDll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" RunDll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Cleared = "1" RunDll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 880 WindowsUpdate.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2012 RunDll32.exe 2004 RunDll32.exe 1364 RunDll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 880 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2012 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 28 PID 1112 wrote to memory of 2012 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 28 PID 1112 wrote to memory of 2012 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 28 PID 1112 wrote to memory of 2004 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 29 PID 1112 wrote to memory of 2004 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 29 PID 1112 wrote to memory of 2004 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 29 PID 1112 wrote to memory of 1364 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 30 PID 1112 wrote to memory of 1364 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 30 PID 1112 wrote to memory of 1364 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 30 PID 1112 wrote to memory of 880 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 32 PID 1112 wrote to memory of 880 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 32 PID 1112 wrote to memory of 880 1112 4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe 32 PID 2004 wrote to memory of 1764 2004 RunDll32.exe 33 PID 2004 wrote to memory of 1764 2004 RunDll32.exe 33 PID 2004 wrote to memory of 1764 2004 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe"C:\Users\Admin\AppData\Local\Temp\4aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\RunDll32.exeRunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 82⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:2012
-
-
C:\Windows\system32\RunDll32.exeRunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 12⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -ResetDestinationList3⤵PID:1764
-
-
-
C:\Windows\system32\RunDll32.exeRunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 22⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1364
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD564b4f3b386da6ba476f04ff381fe8578
SHA1add60248c69f44a8179da31f2955c229afc56085
SHA2564aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa
SHA512625bebfc779e81aae65e62248dc22b6a0e707bd630f7e6a320ccaa94acee3bd1ede0ce2e9b5234fe8622ae9f675ee70dfd3ca7adfdd1bc682d542074a12ad96d
-
Filesize
34KB
MD564b4f3b386da6ba476f04ff381fe8578
SHA1add60248c69f44a8179da31f2955c229afc56085
SHA2564aa50ce7f2217ae1e4c54acbdeaa7de5b02989dc85d2795450999126c152b2fa
SHA512625bebfc779e81aae65e62248dc22b6a0e707bd630f7e6a320ccaa94acee3bd1ede0ce2e9b5234fe8622ae9f675ee70dfd3ca7adfdd1bc682d542074a12ad96d