Analysis
-
max time kernel
122s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe
Resource
win10v2004-20220812-en
General
-
Target
011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe
-
Size
349KB
-
MD5
a02c0cfe9f6d4d93b2eac7b0743c9a6e
-
SHA1
6d78d9e5f0ede4123eb521cb13e57322d1cc973f
-
SHA256
011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339
-
SHA512
58c68c0589e591d449be44a52f9830968f7a2ad064771e1bcfcd2a437a22b6bdde5a323747ce6a742f41b6aa81913f9bf52200a0285db88f886a7ccf5b03c244
-
SSDEEP
6144:ye34Q5Lnu/EJXAF8u1qBhGNy4909VezjiGF+nh9CUZLcb+FAu:6EJXs1q2N1906jidGUZLcb+FF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1812 installstat.exe -
Loads dropped DLL 4 IoCs
pid Process 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 1812 installstat.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\EditPlus\kk53.icw 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30622885a6e4d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373050592" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9811B8B1-5099-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a300000000020000000000106600000001000020000000d0912de0c1af21c646a1e7717edd34e4522fb4dc03e2a3b17b7200fd300cc8d3000000000e80000000020000200000000249a240372410dfaed1925a2239c62a6525fdf9330097fca530d4e10ac7b4b090000000b5ddd2cca9331692f6ba46098fafa7030142ec3f33a6e2985a92bc46df0d0c54e635202f0ba87e37d2e085e2a5d0a1d044bced032d134b48fbc2c33b26cbad9ca54192bc5eef5aef1f1875547ac9071656924c9350a77c91e160fb4f5713bb2658e2cb02922fcb9c7f60868f33f6b7a471561693b4e5eba66e1a79fa89c35df5a616ab1d5994ffe33a942e6a5235a17340000000c2d20b9fd50469c381dbfa7bdf4a1c6ea4eeacd5f04eca23e5344fe1d3804fc3d61b060cf5a68a05fd323b1688b148348a65d4522aec0c0bde0c4147b06ac65f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000005f66233b25e9dad6523e9b2bb82c9ff47d7e6f4e059727d056bcdd229dc11243000000000e8000000002000020000000506f426499f84ef3998089e00f49b9077b0d6f07497dcf64a6848ce1b770290d200000007db705890ab28ed254fcc582e57f26f2bb1499c4cae7b7e00b8557680308fe3440000000c699647c9afcdef30473e9e7df25011d2a5eb05e58b44b75fa83637a2433acc68ad87d592f6ad6590ad53c715090b25f75d2d2df43b1aa8684f2eda5f498b2f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine\ = "VBScript" 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "icwfile" 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\ = "´ò¿ª(&O)" 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe Token: SeBackupPrivilege 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1136 iexplore.exe 1136 iexplore.exe 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE 1184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1692 wrote to memory of 892 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 28 PID 1692 wrote to memory of 892 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 28 PID 1692 wrote to memory of 892 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 28 PID 1692 wrote to memory of 892 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 28 PID 1692 wrote to memory of 892 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 28 PID 1692 wrote to memory of 892 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 28 PID 1692 wrote to memory of 892 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 28 PID 892 wrote to memory of 1956 892 cscript.exe 30 PID 892 wrote to memory of 1956 892 cscript.exe 30 PID 892 wrote to memory of 1956 892 cscript.exe 30 PID 892 wrote to memory of 1956 892 cscript.exe 30 PID 892 wrote to memory of 1956 892 cscript.exe 30 PID 892 wrote to memory of 1956 892 cscript.exe 30 PID 892 wrote to memory of 1956 892 cscript.exe 30 PID 1692 wrote to memory of 1812 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 33 PID 1692 wrote to memory of 1812 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 33 PID 1692 wrote to memory of 1812 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 33 PID 1692 wrote to memory of 1812 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 33 PID 1692 wrote to memory of 1812 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 33 PID 1692 wrote to memory of 1812 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 33 PID 1692 wrote to memory of 1812 1692 011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe 33 PID 1136 wrote to memory of 1184 1136 iexplore.exe 34 PID 1136 wrote to memory of 1184 1136 iexplore.exe 34 PID 1136 wrote to memory of 1184 1136 iexplore.exe 34 PID 1136 wrote to memory of 1184 1136 iexplore.exe 34 PID 1136 wrote to memory of 1184 1136 iexplore.exe 34 PID 1136 wrote to memory of 1184 1136 iexplore.exe 34 PID 1136 wrote to memory of 1184 1136 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe"C:\Users\Admin\AppData\Local\Temp\011a913d154e5c98cc6d319a52dbf2a00bd782d219d72133c1fdbf806875b339.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk53.icw"2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWow64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk53.icw"3⤵PID:1956
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1812
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5da4c29b9c6ad4d8deeca78f6aa617e89
SHA146bbc86b6d7ad996a103679a9faa49a96fac30f5
SHA25640805eb8f47416f3bc600f54cddb73e1daa82b65c9a8abdf9626010b61e1463f
SHA512c61e9426f5ec789b371b5cf65de72f33b8e4aa057a29351c6f62c823aec69b23c9ea8397b931de0cfbd7c1f952c1d98bede36d65f5df7ef98a8a591e8fa31431
-
Filesize
608B
MD5bcd7602652189915ba5e7c444b5c6d3d
SHA18a8ecad5c3f22387bb2ee8778ad9b1584b651a1f
SHA256f8f291684fa1f2795f441fdef2754030936406a8fc596e2dcfca4c2a3e6ff3ee
SHA5124cabcb0cd14d12b0a3690265df4337d816fea053f24b2a258611ef509b183501d6083e9a451d1d0724e8e62c382a27d037043f3733511ef769fa9a87c0643a09
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
842B
MD54c43166a8270d0aedc35933285d958b5
SHA17c20090c0948ac417fe5e127d4a9a318cce6d4df
SHA2568f57f2e1e086ffbe373f94e4936a2388724202333b0c50689f7fa09995e0d1da
SHA512cf5eccf13664661b063138c6d680239618e4cebad1c9eacaaf51dc00591ab307012c019d6fcace761250b30d4da0a93f61c9c28c62b79fe21e51ae3df539ca8e
-
Filesize
80KB
MD5d07bbbe83fdf724da60c885b527b1cb7
SHA159b2e8e4f94348ea8b53fe8e5faea2ceb6beddcf
SHA256b0db29b069d63ab9adad2ba43aa12c9ecac8f3ddf6f9c1ac9c05615c5f7fb664
SHA512034efdb6ffe253345ea1c6348abc64a1eaf2c6ae674ea6f5c2deccb100c53045cebb645a19648a25b1adc53fd13968ddd9e947805e5ee8d3ea7a93b7ecef126b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
80KB
MD5d07bbbe83fdf724da60c885b527b1cb7
SHA159b2e8e4f94348ea8b53fe8e5faea2ceb6beddcf
SHA256b0db29b069d63ab9adad2ba43aa12c9ecac8f3ddf6f9c1ac9c05615c5f7fb664
SHA512034efdb6ffe253345ea1c6348abc64a1eaf2c6ae674ea6f5c2deccb100c53045cebb645a19648a25b1adc53fd13968ddd9e947805e5ee8d3ea7a93b7ecef126b