Analysis
-
max time kernel
129s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe
Resource
win10v2004-20220812-en
General
-
Target
12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe
-
Size
117KB
-
MD5
8133227d9262a562501c984bf1d475c0
-
SHA1
c430930ebee8bf3712cbbc3808b1498686fb8a91
-
SHA256
12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0
-
SHA512
2d7d16f1850270d38fedb1f66b5548d39b7c8b12a683f8233095b018681303a5f4c9f24e56f9a1afacd1d017e729bfe11c7f8d653b6fd9652e73d2cd37bc4761
-
SSDEEP
3072:saJmcpbHhhG5UUUUUUUUUUUUUUUUUUUUUUUUUUAtGB6p1+Y:saPYZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\firewall.exe = "C:\\Users\\Admin\\AppData\\Roaming\\firewall.exe" 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1184 set thread context of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C065871-510C-11ED-8C11-42FEA5F7B9B2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373099918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000a823b648b4e5ffeddc96bb072476a6bc1bad7957c4839e62f7c549e91e9b1ab4000000000e8000000002000020000000be663e2d2620b15693e972316fb2bae78631d4f70c06f7ef4d7b2c2faceeb2a420000000b3da202b28ff3f9dc3f69d60acd84ea268386a3734407203cf8e845c65b7620540000000a2aeb54392fd5fc39f03d3ec50cd6c3b8625f9d55cc310e867868f740ae5fab881ada08c3f7ce007b437112b8ce2d9cd0c341d85a2d4136fcc4f64b4b14bcd2f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908e5d7819e5d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1772 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1408 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 1772 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 1408 iexplore.exe 1408 iexplore.exe 648 IEXPLORE.EXE 648 IEXPLORE.EXE 648 IEXPLORE.EXE 648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1184 wrote to memory of 1772 1184 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 26 PID 1772 wrote to memory of 1408 1772 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 27 PID 1772 wrote to memory of 1408 1772 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 27 PID 1772 wrote to memory of 1408 1772 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 27 PID 1772 wrote to memory of 1408 1772 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe 27 PID 1408 wrote to memory of 648 1408 iexplore.exe 29 PID 1408 wrote to memory of 648 1408 iexplore.exe 29 PID 1408 wrote to memory of 648 1408 iexplore.exe 29 PID 1408 wrote to memory of 648 1408 iexplore.exe 29 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe"C:\Users\Admin\AppData\Local\Temp\12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe"C:\Users\Admin\AppData\Local\Temp\12bffed9dcafd95682c6ea71674ed5e080a9215c54db1c947f8ebbf51c49e6b0.exe"2⤵
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1772 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.sonico.com/postales/view.php?cid=27608078&se=pahola.glachavez%40hotmail.es&db=10&t=ecards_sonico&ss=1&etid=pstlview3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1408 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:648
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55defc4e797da08c754f5bcc8b897e402
SHA1c6beaed445b1640ed44f2648525de754f61cffb4
SHA256b17a9e12f4cda661b7df6ccf2f3375ce7c46332fa8d61d06c89b8aaee014dcd2
SHA512bbfdd01b4f80cc51802294fbed03ff8a1ebbe12e20f29843856bfa41f85056d1085965ce39796897d2d33f9cb65060f803f55f208584b0b1cf7c84a18c7294ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e91e023d755e080c5fbdbc12303366f4
SHA1f5fb5250162685a8759fcc23beab3be68b467f5c
SHA2568b5d0824d691e39dade87adb4dbc54abb4b1bfed713c95719772bfe2a2ab39cf
SHA5127ae705f0f3d3cc09c37a4a16e873295edc2d07367e00b5dd101308acd28ce3031cff71ec165e74939bdd61383a580b71928cea37fcad258fe3717d5cb43b3752
-
Filesize
13KB
MD5a07a2608b0d895aace435a3c15f65120
SHA1ac2aae99bc332daa7419db1f06ac50e1ba7f3102
SHA256a52096606a754907e52e8b472399043e93ee064baeffe9746bd7bb807a8e4e55
SHA512ebc6c97ffc8add0f676dfe5e114d91c8b8d1c49d51bc4ebaf1a23fc32e4e0cdb29d8550623eb32fdb54a9d0165ee76a4f8214291c13edd87cece23d5ead013f7
-
Filesize
601B
MD5cf6dca275cfd4bedfa736dc97e674941
SHA16507bdfb062b24a611e47fb2d90e16ba7e84af74
SHA256b5988c597e8de543833090fb22a1058735c2eeba3cd9b5737739b02791df7cf8
SHA512cb367b33b7de0de090e70a83706433f7d56dd8dda2179826dd0fc3f7d1e0370bf9d4e81a8563908e79a3baa52e540488c5cdc12a6723b8a6d75a7439901184fb