Analysis
-
max time kernel
168s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe
Resource
win10v2004-20220812-en
General
-
Target
98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe
-
Size
230KB
-
MD5
63910bbec02d2249468b4f7da50b3395
-
SHA1
3948b9e5fa323a7ee1e61fff6e61ac879176aef0
-
SHA256
98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2
-
SHA512
e684aa3cd26fca577b22a49134fdffa3583db4cda8aa427218928be95f8aadd8bc35b83e6aa782bf8fb6f0cb266e9d3b2e2b3776f55aa24403bb64a3eb65cfa5
-
SSDEEP
6144:i3C8kHwnQBgk2SyTA8h/GSZlY7INAr8dBiayt:iSTiW2zTrMSs7IVK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 2316 lxfgefcbhfmbwyuk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\I3q7w3u7m.dll 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe File created C:\Windows\system32\spool\PRTPROCS\x64\I3q7w3u7m.dll 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2156 896 WerFault.exe 82 228 4144 WerFault.exe 88 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3136350019" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E5E79D55-5115-11ED-B696-EE6CABA3804C} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991650" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991650" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3136350019" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373103978" IEXPLORE.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5044 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe Token: SeDebugPrivilege 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe Token: SeSecurityPrivilege 2316 lxfgefcbhfmbwyuk.exe Token: SeLoadDriverPrivilege 2316 lxfgefcbhfmbwyuk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1468 IEXPLORE.EXE 1468 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1468 IEXPLORE.EXE 1468 IEXPLORE.EXE 1468 IEXPLORE.EXE 1468 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 5044 wrote to memory of 3056 5044 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe 81 PID 5044 wrote to memory of 3056 5044 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe 81 PID 5044 wrote to memory of 3056 5044 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe 81 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 896 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 82 PID 3056 wrote to memory of 2808 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 87 PID 3056 wrote to memory of 2808 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 87 PID 3056 wrote to memory of 2808 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 87 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 3056 wrote to memory of 4144 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 88 PID 2808 wrote to memory of 1468 2808 iexplore.exe 91 PID 2808 wrote to memory of 1468 2808 iexplore.exe 91 PID 1468 wrote to memory of 3572 1468 IEXPLORE.EXE 93 PID 1468 wrote to memory of 3572 1468 IEXPLORE.EXE 93 PID 1468 wrote to memory of 3572 1468 IEXPLORE.EXE 93 PID 3056 wrote to memory of 2072 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 94 PID 3056 wrote to memory of 2072 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 94 PID 3056 wrote to memory of 2072 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 94 PID 2072 wrote to memory of 3768 2072 iexplore.exe 95 PID 2072 wrote to memory of 3768 2072 iexplore.exe 95 PID 3056 wrote to memory of 2316 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 96 PID 3056 wrote to memory of 2316 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 96 PID 3056 wrote to memory of 2316 3056 98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe"C:\Users\Admin\AppData\Local\Temp\98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exeC:\Users\Admin\AppData\Local\Temp\98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 2044⤵
- Program crash
PID:2156
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1468 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 2044⤵
- Program crash
PID:228
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
PID:3768
-
-
-
C:\Users\Admin\AppData\Local\Temp\lxfgefcbhfmbwyuk.exe"C:\Users\Admin\AppData\Local\Temp\lxfgefcbhfmbwyuk.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 896 -ip 8961⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4144 -ip 41441⤵PID:2436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe
Filesize110KB
MD5961b8e35099de4ab1772bc8839fa588f
SHA1c920b938df8609e4dd51d1ceeea9a4eedabee469
SHA2566331d2e52950b05a35f334511a5dc1145bdbb4c858b1e91517b4ae3128c20a7b
SHA512d59010c9ea471243341accca51d66b1b31a202f5aef058db432cfe62a25cc4a709369ed45f434ba64c035142d09ac335ba79d603b24b755658d0a799303e9c93
-
C:\Users\Admin\AppData\Local\Temp\98f970361bf8d0838057c73017822ad6689d3adc3aeb35eebce8ce8015507db2mgr.exe
Filesize110KB
MD5961b8e35099de4ab1772bc8839fa588f
SHA1c920b938df8609e4dd51d1ceeea9a4eedabee469
SHA2566331d2e52950b05a35f334511a5dc1145bdbb4c858b1e91517b4ae3128c20a7b
SHA512d59010c9ea471243341accca51d66b1b31a202f5aef058db432cfe62a25cc4a709369ed45f434ba64c035142d09ac335ba79d603b24b755658d0a799303e9c93
-
Filesize
110KB
MD5961b8e35099de4ab1772bc8839fa588f
SHA1c920b938df8609e4dd51d1ceeea9a4eedabee469
SHA2566331d2e52950b05a35f334511a5dc1145bdbb4c858b1e91517b4ae3128c20a7b
SHA512d59010c9ea471243341accca51d66b1b31a202f5aef058db432cfe62a25cc4a709369ed45f434ba64c035142d09ac335ba79d603b24b755658d0a799303e9c93
-
Filesize
110KB
MD5961b8e35099de4ab1772bc8839fa588f
SHA1c920b938df8609e4dd51d1ceeea9a4eedabee469
SHA2566331d2e52950b05a35f334511a5dc1145bdbb4c858b1e91517b4ae3128c20a7b
SHA512d59010c9ea471243341accca51d66b1b31a202f5aef058db432cfe62a25cc4a709369ed45f434ba64c035142d09ac335ba79d603b24b755658d0a799303e9c93