Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe
Resource
win10v2004-20220812-en
General
-
Target
167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe
-
Size
24KB
-
MD5
65d71dedd2cea264c151c442325a17c0
-
SHA1
a0984eb5d30ba6d28ee7c7ba547015eac208aea1
-
SHA256
167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d
-
SHA512
67d3a1af4f563feeb904d63d5cbac609b89a70d0dd0f42f293d3d2ff6c55cbf9bdb27472c929ed0966c33076d287f995b6cf8d277eea67be631a96cb8c343ef1
-
SSDEEP
384:/zqc/RK97lGre2vD6eVjlJ4spvT1ZKNpltxDlJnELKt8Cy/jhGl9+:bqco9Are2fjlJ4sJEPxoU8Cy/jh4Q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2108 socks.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Mation.inf 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe File created C:\Windows\Debugs.inf 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe File created C:\Windows\socks.exe 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe File opened for modification C:\Windows\socks.exe 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3364792463" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\888979.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30988135" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e74ad167d7d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\888979.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\888979.com\Total = "900" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3364792463" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "900" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.888979.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e169d167d7d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000942172d9cd0b007833a4fc5a6f13b19b9b9049593aeb3199ea7e11742345d011000000000e8000000002000020000000933387f835eb8d03c3ef2452d0d48439c55bb47ac9afb1e0bac2f59de93c56e720000000c740624e58605fb7a35401bfb3e0a1d55db9d2cb6cf27a7d26961ea1f5f8c363400000002e244adce16c608a096065407af2f6d3bcf7c04cfc8618d6373c190493bdab19237b43506844e74798f46d9e79ea11b7601022cfbf53fc2039e9a295c1dfa7d8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d9120000000000200000000001066000000010000200000007b984dbf252201e3dba50ae629783e9e654ce813c8b9ba63a1222444ce3aa755000000000e80000000020000200000001e65d3ffe495c2f3a59ccf2c6a525aa7aca038ec64c1f83e884b16e5aae2ed78200000005cf70fe806bcae2154082e802157df31fbe3dd1942bebb775c484fe451c5041340000000e0b6e03a6f4b88a22319f809f044160e9f26590ccfc72d7321c41086dcf69a4146c955b7ae34081e89bcf3313836ebfa17451a81b58f71d8e9369f16d9dc73a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371594326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F1986119-435A-11ED-AECB-DAE60F07E07D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\888979.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.888979.com\ = "900" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988135" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3439636217" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988135" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 5056 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 5056 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 2108 socks.exe 2108 socks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1324 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1324 iexplore.exe 1324 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1324 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 80 PID 5068 wrote to memory of 1324 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 80 PID 5068 wrote to memory of 4256 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 81 PID 5068 wrote to memory of 4256 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 81 PID 5068 wrote to memory of 5056 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 82 PID 5068 wrote to memory of 5056 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 82 PID 5068 wrote to memory of 5056 5068 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 82 PID 1324 wrote to memory of 2332 1324 iexplore.exe 83 PID 1324 wrote to memory of 2332 1324 iexplore.exe 83 PID 1324 wrote to memory of 2332 1324 iexplore.exe 83 PID 5056 wrote to memory of 2108 5056 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 84 PID 5056 wrote to memory of 2108 5056 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 84 PID 5056 wrote to memory of 2108 5056 167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe"C:\Users\Admin\AppData\Local\Temp\167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.888979.com2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.vqq.com2⤵
- Modifies Internet Explorer settings
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe"C:\Users\Admin\AppData\Local\Temp\167f7172facd9e494e3404c1ec307db0d7d6053005e5428d51bec1b33777144d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\socks.exe"C:\Windows\socks.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD502f6c829105aa55ac9c1b0d00fe5e61d
SHA197d2dfeb5b6a643e0eb2d7136022da7266ef3b72
SHA256f1985cc277d4f5121bcdd6688203563e597ae7cfa4bd06322f31272ecd0acc69
SHA512beaafcc8cf64388d1347759020668c4352c75baeab2192000501be0dc621c539a782c1fcd36210ff57804f2f78a18146a0c802a66f3366aea905e3a656cdfcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5046bedf3b97e782edc5343dc24a1c485
SHA1ebad04906d01fdb00719463e729f201a043433ae
SHA2564bb13178dccf62921053ef1b62f9bdb994dfd0520741873a60ac2c1484df78ca
SHA51218203014488892166d7c331f8239c1c030fd9831b8040d51b3fdf3d887f867380ff639ccac26e8751b7b13d1dc83e2931f96019783695e7a93c4348046c9fabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD57486b41795c720a62b9c94210592fdd3
SHA1f645f02d2aa224f5380940267f0b0396a2d724f7
SHA256ee48dc9b32018eaf2ed4100d1230463807006803d2707572417938152b5f9988
SHA512015646264e145339b9c85c4955d06411c84364e2fd67f14eb5d93da9eb0e8940d524dcacdba4d4c2ac853f59db6a5d03b226b6b1433a23d224f817c416d87913
-
Filesize
13B
MD5e353e98883820415ad14807b2a97920f
SHA1e0dd02b23270df333700e6f163cc84ad61e6bbfb
SHA256d87401fe5397a05eaaa08623b898465764369ae13a9eb2c19f745b534d8750f5
SHA512f3bcc630c0f7de4e144f9ec7b1dff1de033e56fb923ef5c7c96fdd5c59a1d50d89fc30c371ab569f61028c5fd3fe540a16ecefc0e2c26e5c4c3a15d98ff007c2
-
Filesize
12.9MB
MD52b6252b9d475e1d8f55a38f11f688b39
SHA1ad7077d77aa96780a9f473b8f27f1e892e10c00a
SHA256cccba0f37fa1009f8f19f59de33ad427399db2ac6a695c0d080642a2c0f39adb
SHA512c79927282394991bebb75ad9e940733ade21690ecb1f9733c86efe0516c24feb1b1076a96f660c7891ceb4fac569a78f24dcc5f523c4d5eef12f09e6f127cc06
-
Filesize
12.9MB
MD52b6252b9d475e1d8f55a38f11f688b39
SHA1ad7077d77aa96780a9f473b8f27f1e892e10c00a
SHA256cccba0f37fa1009f8f19f59de33ad427399db2ac6a695c0d080642a2c0f39adb
SHA512c79927282394991bebb75ad9e940733ade21690ecb1f9733c86efe0516c24feb1b1076a96f660c7891ceb4fac569a78f24dcc5f523c4d5eef12f09e6f127cc06