Analysis
-
max time kernel
140s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 13:05
Behavioral task
behavioral1
Sample
4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe
Resource
win10v2004-20220901-en
General
-
Target
4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe
-
Size
139KB
-
MD5
a236c0b8e461f5bee9702aebc4cfc769
-
SHA1
d5fb02bb058db459e1094c5bf18c64e19364f55a
-
SHA256
4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b
-
SHA512
0a679a923ef88c579b7cf558db46da7d899b615c7546950fd1f96a9ad98db0662a5b342c3a80f0efb2f8d48974e59b5162b435a4c3abcaaa29974de4f563eac1
-
SSDEEP
3072:35feitbnL/lrPdldokXI25nPExUrpa0zw45U3766:3BX//voqLP6UFfwvr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372958449" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CC6BED1-4FC3-11ED-BF3D-D6AAFEFD221A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409c9ce9cfe3d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf00000000020000000000106600000001000020000000e0a1c49202a92211487e11c09033617d2f97cecde83e6c81fc0c4f4c54c81abb000000000e8000000002000020000000fb7127b2003b68914395dc01ea3ea42a942fabb79f11c699761cb2919c547a1a20000000d9085d692b83788108e6491c903abf73fea5efc14bda51c5d1ac63933e932cd6400000007f5da671f5d9a079c530165d4c5e84377762046285b086f892120ba1f2e2814ffd43196168bd446fe89deaba41018b642deb9e26d73d387b825c96990efbd05f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1396 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe 1768 iexplore.exe 1768 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1768 1396 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe 27 PID 1396 wrote to memory of 1768 1396 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe 27 PID 1396 wrote to memory of 1768 1396 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe 27 PID 1396 wrote to memory of 1768 1396 4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe 27 PID 1768 wrote to memory of 1720 1768 iexplore.exe 29 PID 1768 wrote to memory of 1720 1768 iexplore.exe 29 PID 1768 wrote to memory of 1720 1768 iexplore.exe 29 PID 1768 wrote to memory of 1720 1768 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe"C:\Users\Admin\AppData\Local\Temp\4d587afc8859baedbb367f62196f5bc9f145b569ee8fe53f5f2994d1df88988b.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=gOO_UqzEc5Y2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD50345fb796f4f26c9ff88187e113554b7
SHA17b87578cfb91a2a7850a4226d1bee91ab3efd5b6
SHA25605bd748690c595f4d87e7515fcced3fc57be369909eb432548ea30f34fe0f86b
SHA512131bcff74e384e1b3c6398bfb7f96d6403aa7ea0015b323ce8dbe095c17e2914da3c73ccd06edfc45ccfa5761193df9f0f7f98f31daeab0c94a24aaaa75e4888
-
Filesize
5KB
MD5027f17f03d498f955fcbfae963e3bc3d
SHA187037c8a5bde72bcd49425916da01420d7687c81
SHA256710d0728326bf897669d47384b0fdb7e62d50855c94af15c0eb5f6314f9a04a7
SHA51200f1d316ad72f5babbf340530720c64492f00a46f8e985fa0cec4451e388611f0c493301ca67794b0fc3d7f9badf95772bb479692b18f6022e171eb2959757a0
-
Filesize
608B
MD5ea261219029c744f680b870d4a03fc84
SHA11de56b7e2b5ef837086379283f071cadac10055f
SHA256c07a062a8abb39c388ebc1ba13a313ba4ed07509ecfa7e96f5a0a7ba1a889949
SHA512c1a76cc565298368f30ec8a6bd2a8ef33a8cc9c80d75ad14af13c82f9b75ba1a67b93b583b809fcde14cc25e2bad95c2299ab69013296b6b940e64b27dfd1320