Analysis
-
max time kernel
167s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 13:05
Behavioral task
behavioral1
Sample
a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe
Resource
win10v2004-20220812-en
General
-
Target
a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe
-
Size
659KB
-
MD5
2ee9076557c7c3ff17203b0ccba0501f
-
SHA1
b235a9d7e422c7ea03a8e36023cbf2de2c04724e
-
SHA256
a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f
-
SHA512
9f452245a36e24b5c3ee6854196fd7e409e120f3c4b98833f2801938dfe8dd2f07dbdc5b94b6b629f6d596419b4e2044b527b01a86efdb745f55c6a2bed3f318
-
SSDEEP
12288:2ITHQuBsNYHuo1y0I5sG1/HkgUcU6kUgnd5aNesU:2ITQURHu8yEG506Yndxs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy -
resource yara_rule behavioral2/memory/1376-132-0x0000000000400000-0x00000000005BC000-memory.dmp upx behavioral2/files/0x000400000000072f-134.dat upx behavioral2/files/0x000400000000072f-135.dat upx behavioral2/memory/4260-136-0x0000000000400000-0x00000000005BC000-memory.dmp upx behavioral2/memory/1376-137-0x0000000000400000-0x00000000005BC000-memory.dmp upx behavioral2/memory/4260-138-0x0000000000400000-0x00000000005BC000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy 4260 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1376 wrote to memory of 4260 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 82 PID 1376 wrote to memory of 4260 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 82 PID 1376 wrote to memory of 4260 1376 a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe"C:\Users\Admin\AppData\Local\Temp\a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmyC:\Users\Admin\AppData\Local\Temp\a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy
Filesize659KB
MD52ee9076557c7c3ff17203b0ccba0501f
SHA1b235a9d7e422c7ea03a8e36023cbf2de2c04724e
SHA256a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f
SHA5129f452245a36e24b5c3ee6854196fd7e409e120f3c4b98833f2801938dfe8dd2f07dbdc5b94b6b629f6d596419b4e2044b527b01a86efdb745f55c6a2bed3f318
-
C:\Users\Admin\AppData\Local\Temp\a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f.dmy
Filesize659KB
MD52ee9076557c7c3ff17203b0ccba0501f
SHA1b235a9d7e422c7ea03a8e36023cbf2de2c04724e
SHA256a537621e9dd330cc6973fa3962ee872043373d9aa1c6ee99f6f90d7fe2f1ac8f
SHA5129f452245a36e24b5c3ee6854196fd7e409e120f3c4b98833f2801938dfe8dd2f07dbdc5b94b6b629f6d596419b4e2044b527b01a86efdb745f55c6a2bed3f318
-
Filesize
453KB
MD56df0ed0afe162198116be68aba60e0c4
SHA1bd0ca25ff4e495717be7345933aaa90755e5a6ca
SHA25614172cccc2b24d7b490b6038c9493e64d5cab4afeee62014710dfad546eec9dc
SHA5126696ec1e2261e44e1259609f74e95c205165048d94e581f44b09b87fc70e89b2eaeecd09b7de9cb9735dab0b9d90dd4ff7b5ac07e4b5bd8e5f502e71bbfdb757
-
Filesize
453KB
MD56df0ed0afe162198116be68aba60e0c4
SHA1bd0ca25ff4e495717be7345933aaa90755e5a6ca
SHA25614172cccc2b24d7b490b6038c9493e64d5cab4afeee62014710dfad546eec9dc
SHA5126696ec1e2261e44e1259609f74e95c205165048d94e581f44b09b87fc70e89b2eaeecd09b7de9cb9735dab0b9d90dd4ff7b5ac07e4b5bd8e5f502e71bbfdb757