Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 01:27
Behavioral task
behavioral1
Sample
1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe
Resource
win10v2004-20220812-en
General
-
Target
1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe
-
Size
2.3MB
-
MD5
44db7eac355a7f2ecd9f35e1ef704491
-
SHA1
45a2e5ad25875e175647ec55dbd21bb605d97e37
-
SHA256
1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c
-
SHA512
ad67e9b50d35dcd959bfae2673e499ce23b15b1d4e39882fb87c963dc7185686273fccc354443d8c40b2a502224141dd78955d7b45b2bb51590aa358f3bdd4ef
-
SSDEEP
49152:ddl9JT2M+UGZaEWeourrv2YlvvXozq/Jb4P3O6JE/KUGq76LM/X:ddl9JT4RWYv/CPWLy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4332-132-0x0000000000400000-0x000000000091A000-memory.dmp vmprotect behavioral2/memory/4332-133-0x0000000000400000-0x000000000091A000-memory.dmp vmprotect behavioral2/memory/4332-136-0x0000000000400000-0x000000000091A000-memory.dmp vmprotect behavioral2/memory/4332-140-0x0000000000400000-0x000000000091A000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1568582829" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1568893286" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30989605" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372225492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989605" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30989605" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1568582829" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989605" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989605" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7DFFEAA8-4918-11ED-B696-DAE60F07E07D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1568893286" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1737331501" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 1992 iexplore.exe 1992 iexplore.exe 4756 IEXPLORE.EXE 4756 IEXPLORE.EXE 4756 IEXPLORE.EXE 4756 IEXPLORE.EXE 1992 iexplore.exe 1992 iexplore.exe 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1992 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 84 PID 4332 wrote to memory of 1992 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 84 PID 1992 wrote to memory of 4756 1992 iexplore.exe 85 PID 1992 wrote to memory of 4756 1992 iexplore.exe 85 PID 1992 wrote to memory of 4756 1992 iexplore.exe 85 PID 4332 wrote to memory of 3440 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 86 PID 4332 wrote to memory of 3440 4332 1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe 86 PID 1992 wrote to memory of 1476 1992 iexplore.exe 87 PID 1992 wrote to memory of 1476 1992 iexplore.exe 87 PID 1992 wrote to memory of 1476 1992 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe"C:\Users\Admin\AppData\Local\Temp\1621ee3badd0eaf453d0aee16e0dae999b571222e2f619affd58a1eec6f8655c.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:17416 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:3440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5fceed7a5f76725fb398c6a91ff552899
SHA1237aec000ae7c7c35a639664b1ad6c0d842a0749
SHA2562888c66a6908f10474313b2fef31aeeff40cffe1bcbd19b84b29334ff6a71383
SHA512adfba4e72523d38395c13122d6498d9b48d93b2967858f0208549e3830c9b47ee3e98249b98fe585aeeeffe491a6985a98c80a3be581abccf4239bad4d1cdef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5fceed7a5f76725fb398c6a91ff552899
SHA1237aec000ae7c7c35a639664b1ad6c0d842a0749
SHA2562888c66a6908f10474313b2fef31aeeff40cffe1bcbd19b84b29334ff6a71383
SHA512adfba4e72523d38395c13122d6498d9b48d93b2967858f0208549e3830c9b47ee3e98249b98fe585aeeeffe491a6985a98c80a3be581abccf4239bad4d1cdef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5ee8d4c65d428c4b08b20ce1626e93f86
SHA1ce7254d9e3d33e5a6aa5e687ae2bdf9618cf874e
SHA2563cadf8cb0988ab8eeded4106443a34b0116bf29ef74ec0e26a7d08da821dc65e
SHA512a02dfc2fdede579ac9548e5bd1c717df805a084ac75783d309c67ded55f902af0f0cec714b84ec1b921d6a44345094ae08832c1a163212c1c3825a7d9ea09263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5c5e9e3fe5a05f5629969bac66214e364
SHA1f05a0924a401dd7d7c4c2b563dc46c2fa142de52
SHA256e0683030c4385b43db41944db50bb356d1b034f7d2dcc199cc6688a27a34be66
SHA51232e5b31fe9468d40c98629c649a7ac99ddb0401ac095d950c6acb5725f68a1e268beb159fa03b4baa463b014d0b2ffae06f6888110d5b2eff54215f20d88f044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5c5e9e3fe5a05f5629969bac66214e364
SHA1f05a0924a401dd7d7c4c2b563dc46c2fa142de52
SHA256e0683030c4385b43db41944db50bb356d1b034f7d2dcc199cc6688a27a34be66
SHA51232e5b31fe9468d40c98629c649a7ac99ddb0401ac095d950c6acb5725f68a1e268beb159fa03b4baa463b014d0b2ffae06f6888110d5b2eff54215f20d88f044