Analysis
-
max time kernel
106s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
2353ca7bfff8ffaaced210c1a51fc804058677b0e5f15ba5fe0b157676cee4b6.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2353ca7bfff8ffaaced210c1a51fc804058677b0e5f15ba5fe0b157676cee4b6.dll
Resource
win10v2004-20220901-en
General
-
Target
2353ca7bfff8ffaaced210c1a51fc804058677b0e5f15ba5fe0b157676cee4b6.dll
-
Size
128KB
-
MD5
57e216dd583d1e0bd994370d9cc06add
-
SHA1
03bb0870d94181ea3719b32838618dae3d391565
-
SHA256
2353ca7bfff8ffaaced210c1a51fc804058677b0e5f15ba5fe0b157676cee4b6
-
SHA512
3b3ae56cafd9eda3c73c3b455b274d5229c5a97f19aeb816b1efa49d7cca2d358e62c1bc1d6cc1379a62dca49c039704ec031373a77c745898d48cc41a482c58
-
SSDEEP
3072:D9DXmroY9wjVpDFZ/ok8YwiLveB+Qhh04dOQM:DtqsN/vIyWgQh/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3896 SC4O823 3728 kaoqymvcsywrabck.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SC4O823 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 320 2844 WerFault.exe 87 5088 4060 WerFault.exe 99 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30989855" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{082C2749-4A13-11ED-A0EE-E6C35CACCF0B} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3702830171" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989855" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3902831471" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989855" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3708924958" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989855" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3702830171" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372333087" IEXPLORE.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3896 SC4O823 Token: SeDebugPrivilege 3896 SC4O823 Token: SeSecurityPrivilege 3728 kaoqymvcsywrabck.exe Token: SeLoadDriverPrivilege 3728 kaoqymvcsywrabck.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4504 IEXPLORE.EXE 4504 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4504 IEXPLORE.EXE 4504 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 4504 IEXPLORE.EXE 4504 IEXPLORE.EXE 3592 IEXPLORE.EXE 3592 IEXPLORE.EXE 3592 IEXPLORE.EXE 3592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2640 1580 rundll32.exe 84 PID 1580 wrote to memory of 2640 1580 rundll32.exe 84 PID 1580 wrote to memory of 2640 1580 rundll32.exe 84 PID 2640 wrote to memory of 3896 2640 rundll32.exe 86 PID 2640 wrote to memory of 3896 2640 rundll32.exe 86 PID 2640 wrote to memory of 3896 2640 rundll32.exe 86 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 2844 3896 SC4O823 87 PID 3896 wrote to memory of 5112 3896 SC4O823 96 PID 3896 wrote to memory of 5112 3896 SC4O823 96 PID 3896 wrote to memory of 5112 3896 SC4O823 96 PID 5112 wrote to memory of 4504 5112 iexplore.exe 97 PID 5112 wrote to memory of 4504 5112 iexplore.exe 97 PID 4504 wrote to memory of 2780 4504 IEXPLORE.EXE 98 PID 4504 wrote to memory of 2780 4504 IEXPLORE.EXE 98 PID 4504 wrote to memory of 2780 4504 IEXPLORE.EXE 98 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4060 3896 SC4O823 99 PID 3896 wrote to memory of 4296 3896 SC4O823 103 PID 3896 wrote to memory of 4296 3896 SC4O823 103 PID 3896 wrote to memory of 4296 3896 SC4O823 103 PID 4296 wrote to memory of 3456 4296 iexplore.exe 104 PID 4296 wrote to memory of 3456 4296 iexplore.exe 104 PID 4504 wrote to memory of 3592 4504 IEXPLORE.EXE 105 PID 4504 wrote to memory of 3592 4504 IEXPLORE.EXE 105 PID 4504 wrote to memory of 3592 4504 IEXPLORE.EXE 105 PID 3896 wrote to memory of 3728 3896 SC4O823 106 PID 3896 wrote to memory of 3728 3896 SC4O823 106 PID 3896 wrote to memory of 3728 3896 SC4O823 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2353ca7bfff8ffaaced210c1a51fc804058677b0e5f15ba5fe0b157676cee4b6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2353ca7bfff8ffaaced210c1a51fc804058677b0e5f15ba5fe0b157676cee4b6.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\SC4O823"SC4O823"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 2045⤵
- Program crash
PID:320
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4504 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4504 CREDAT:17416 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 2045⤵
- Program crash
PID:5088
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"5⤵
- Modifies Internet Explorer settings
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\kaoqymvcsywrabck.exe"C:\Users\Admin\AppData\Local\Temp\kaoqymvcsywrabck.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2844 -ip 28441⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4060 -ip 40601⤵PID:5104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5957d711ef13aae49d723c4d2b1d4fa37
SHA1aa818a5cfb5ce97987c05c8f20866cbbafb4bf93
SHA25643184ac9a857febd19b97a04797528a7de0c15744ae3d540e23cc4b5f1d2641b
SHA512f5c8fb180bba40d0755c909349bb960be5b8242de651237b9c2368d74accbf845f3cad131ff9b80f71745353dd11b53ddda7fd5cb928a2f543be217b9e975030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5dec92f67e96fe44831ac006946a1eb57
SHA10de28e384151facfe6c40c3c4c862406d2446274
SHA256f7b70553f9cdd9808e443ac9e0b81d57c6353dacec531192ad605cc136fd6eac
SHA51254393007a40c4515c1e791439022e61135d6b9856efbc650cdb7f2495f9e1de6ddb3f38fa45e5e2d46b3004bbf9fd1483442bbbd5f4d065677851f8923a6ef29
-
Filesize
94KB
MD52c1f8a0fa5ea49ef80bb7f6cdcdd946f
SHA129e1a5bb66437404e04bb13b2f77b7876ab794cf
SHA2561a21cfd3103820715d2c6b13282a4002f08a0e56b034bce24de1726185ef73b4
SHA512053b48b147495c576f2f6ce8add509613949056355d6518cf345ad4e8959690e194f0a79b9eb42fc78a57a5d8bd9b45913202be635a762a02f939a83b8a5213b
-
Filesize
94KB
MD52c1f8a0fa5ea49ef80bb7f6cdcdd946f
SHA129e1a5bb66437404e04bb13b2f77b7876ab794cf
SHA2561a21cfd3103820715d2c6b13282a4002f08a0e56b034bce24de1726185ef73b4
SHA512053b48b147495c576f2f6ce8add509613949056355d6518cf345ad4e8959690e194f0a79b9eb42fc78a57a5d8bd9b45913202be635a762a02f939a83b8a5213b
-
Filesize
94KB
MD52c1f8a0fa5ea49ef80bb7f6cdcdd946f
SHA129e1a5bb66437404e04bb13b2f77b7876ab794cf
SHA2561a21cfd3103820715d2c6b13282a4002f08a0e56b034bce24de1726185ef73b4
SHA512053b48b147495c576f2f6ce8add509613949056355d6518cf345ad4e8959690e194f0a79b9eb42fc78a57a5d8bd9b45913202be635a762a02f939a83b8a5213b
-
Filesize
94KB
MD52c1f8a0fa5ea49ef80bb7f6cdcdd946f
SHA129e1a5bb66437404e04bb13b2f77b7876ab794cf
SHA2561a21cfd3103820715d2c6b13282a4002f08a0e56b034bce24de1726185ef73b4
SHA512053b48b147495c576f2f6ce8add509613949056355d6518cf345ad4e8959690e194f0a79b9eb42fc78a57a5d8bd9b45913202be635a762a02f939a83b8a5213b