Analysis
-
max time kernel
136s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 03:18
Static task
static1
Behavioral task
behavioral1
Sample
7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe
Resource
win10v2004-20220901-en
General
-
Target
7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe
-
Size
212KB
-
MD5
52aa68a076b089ea3570b00f1891e4a4
-
SHA1
430e28c1452084e41954d3a7c3d2b3b9642df4bb
-
SHA256
7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b
-
SHA512
676773c2b4a6228cfb1e056c969ef7a7f8ef7b214bc777912ddc85138b847d55c808cbcb7811ab72547f58dd141f6644e7f6b34282dbc0b592e1caaa151a36bb
-
SSDEEP
3072:ZQExuz37QQK2PFuCNZ1z4FtP7qM98mORblMMIVBri4hDjKNhLf9TOaB4:VxuzthbZAOM98tp4vrLpGN1f9Oa2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2140 SLw9R23 3020 ypegkdsskouwbirp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SLw9R23 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1876 3848 WerFault.exe 85 4480 4808 WerFault.exe 97 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991471" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373026789" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "57253852" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991471" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "64596688" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2EDC4AA2-5062-11ED-A0EE-62142853BA25} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991471" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "57253852" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991471" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "256630158" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3180 IEXPLORE.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2140 SLw9R23 Token: SeDebugPrivilege 2140 SLw9R23 Token: SeSecurityPrivilege 3020 ypegkdsskouwbirp.exe Token: SeLoadDriverPrivilege 3020 ypegkdsskouwbirp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3180 IEXPLORE.EXE 3180 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3180 IEXPLORE.EXE 3180 IEXPLORE.EXE 5044 IEXPLORE.EXE 5044 IEXPLORE.EXE 5044 IEXPLORE.EXE 5044 IEXPLORE.EXE 3180 IEXPLORE.EXE 3180 IEXPLORE.EXE 4540 IEXPLORE.EXE 4540 IEXPLORE.EXE 4540 IEXPLORE.EXE 4540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2140 5016 7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe 84 PID 5016 wrote to memory of 2140 5016 7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe 84 PID 5016 wrote to memory of 2140 5016 7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe 84 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3848 2140 SLw9R23 85 PID 2140 wrote to memory of 3356 2140 SLw9R23 93 PID 2140 wrote to memory of 3356 2140 SLw9R23 93 PID 2140 wrote to memory of 3356 2140 SLw9R23 93 PID 3356 wrote to memory of 3180 3356 iexplore.exe 95 PID 3356 wrote to memory of 3180 3356 iexplore.exe 95 PID 3180 wrote to memory of 5044 3180 IEXPLORE.EXE 96 PID 3180 wrote to memory of 5044 3180 IEXPLORE.EXE 96 PID 3180 wrote to memory of 5044 3180 IEXPLORE.EXE 96 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 4808 2140 SLw9R23 97 PID 2140 wrote to memory of 3420 2140 SLw9R23 101 PID 2140 wrote to memory of 3420 2140 SLw9R23 101 PID 2140 wrote to memory of 3420 2140 SLw9R23 101 PID 3420 wrote to memory of 4768 3420 iexplore.exe 102 PID 3420 wrote to memory of 4768 3420 iexplore.exe 102 PID 3180 wrote to memory of 4540 3180 IEXPLORE.EXE 103 PID 3180 wrote to memory of 4540 3180 IEXPLORE.EXE 103 PID 3180 wrote to memory of 4540 3180 IEXPLORE.EXE 103 PID 2140 wrote to memory of 3020 2140 SLw9R23 104 PID 2140 wrote to memory of 3020 2140 SLw9R23 104 PID 2140 wrote to memory of 3020 2140 SLw9R23 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe"C:\Users\Admin\AppData\Local\Temp\7e48a2f2231593640d5659851dad095edf15e19c24dbe1e29297ddc52fcf8f2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\SLw9R23"SLw9R23"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 2044⤵
- Program crash
PID:1876
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3180 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5044
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3180 CREDAT:17416 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4540
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 2044⤵
- Program crash
PID:4480
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\ypegkdsskouwbirp.exe"C:\Users\Admin\AppData\Local\Temp\ypegkdsskouwbirp.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3848 -ip 38481⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4808 -ip 48081⤵PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD56a15e3564b9eb382fe5534f59d6fccb4
SHA1911dbc1a988c2d6816beb0c21c4ea5402253b884
SHA2566b478c66c9a2024177d4a478ccea9a82f3162aa87a5125a0dc3750c920bdbc62
SHA5122801f46d495eed08dbb10e73ccda4828faf4ef6b1ff3ff45ce8d73331e692381c25417d15c958f8c3f9c6932300cd0e66b1aad6bb5a92e2bf27b338b6d245711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD53e4f1eec7848a9cd52b46790225a5d5c
SHA1b3094183e10c67c444a244ffee84c703dff179c0
SHA256950a6c232b6457d0b8e259fed2fa80cb1e1eafe72ccdbd241aa9090fe58aebe0
SHA512722af218a733b78b166220d71f48388c7ca2f80c293a0622259904e743878184606ad04ad05a2c6c8503f5a8bb2fd7a18b9b9d7863ae042180e6dbdeaac67b69
-
Filesize
94KB
MD59b0f876cef335a2489822b49588ed462
SHA1be7036761b0a1fbcb7d5aeb7f10e39368d871029
SHA2563acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669
SHA512bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b
-
Filesize
94KB
MD59b0f876cef335a2489822b49588ed462
SHA1be7036761b0a1fbcb7d5aeb7f10e39368d871029
SHA2563acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669
SHA512bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b
-
Filesize
94KB
MD59b0f876cef335a2489822b49588ed462
SHA1be7036761b0a1fbcb7d5aeb7f10e39368d871029
SHA2563acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669
SHA512bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b
-
Filesize
94KB
MD59b0f876cef335a2489822b49588ed462
SHA1be7036761b0a1fbcb7d5aeb7f10e39368d871029
SHA2563acfc174c67d0121ce5335888a7b559d44c94849e7f429c0509c487b5b533669
SHA512bbf042c2190c2bab6227b84258fcf0ce8435960c2c47a9430a2fe27eccea84f9dc9e0c5487052f9b90f5459a323be2546df98e940e22c96dcc445ed4829b215b