Analysis
-
max time kernel
128s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 01:42
Static task
static1
Behavioral task
behavioral1
Sample
b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe
Resource
win10v2004-20220812-en
General
-
Target
b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe
-
Size
528KB
-
MD5
4b88c6e996a391b8be1ede13d555e63d
-
SHA1
96ed996d88a6214a048f7f445bbf19dd33a2140c
-
SHA256
b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135
-
SHA512
514c42bfbae92d786e612d620994a4f39ce161a936636a56fa66dc540cf7ea8e091a244fa04fff452591ef20ca32db87beb69213ac96f0ef771dffc2e2b6cc61
-
SSDEEP
6144:qo2gmzMtvK9x08Opj5XV+1iRkST3H963kbZw6EBRiWcfX:nFmKa
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\wmplayer.exe" b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373111459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A024AC1-5127-11ED-8AB9-FAB5137186BE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a30000000002000000000010660000000100002000000062e9f1b892342b34acdf1dc3aaec526d0c189d74a5051febac053ab73e7f5de8000000000e80000000020000200000004bacffaef72d50f5798115c0c16265dfd03c71b92872a8a00a4625dad3ac33e620000000c5d60b756a6b25d636dc1fd91a5bc6ab132480ec5b035584acb60d971d32823e40000000e3908def7d0201af84a2e6b425c1f55204e8749cf9ecc56de904a4cf12f27f106a6fdd4007c88423a30865043114eebf02204c365a6e24401419ba1e80a5443e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c58c3f34e5d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Download b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1692 b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe 2012 iexplore.exe 2012 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2012 1692 b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe 28 PID 1692 wrote to memory of 2012 1692 b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe 28 PID 1692 wrote to memory of 2012 1692 b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe 28 PID 1692 wrote to memory of 2012 1692 b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe 28 PID 2012 wrote to memory of 1092 2012 iexplore.exe 30 PID 2012 wrote to memory of 1092 2012 iexplore.exe 30 PID 2012 wrote to memory of 1092 2012 iexplore.exe 30 PID 2012 wrote to memory of 1092 2012 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe"C:\Users\Admin\AppData\Local\Temp\b77a49e4a133da84942f4eb94d9ed19dc04051b7dc53928f8ce155cfda7dc135.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=tkFQS92d6gw2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD57a8473c6306ba5e2ac47b90cd89c037c
SHA1d7128b01f9c0b851dded940f09b52213e61b7109
SHA2560c164c8c51444a71f52dbdc2323d576de3646b48f549c0ed1839ffc0cb866f27
SHA51228c7a48d489d17b411a8d838fca7c722be43e1c3f952acfd99020141cf047719ec1cda473ff9f80cecd094dd7c877c666026e770a42287c51cd14166824229c8
-
Filesize
5KB
MD51bf8d0b6968586bb630f6945d00e19f1
SHA1649b5a1c254c03fc9e7408903968258188ad6388
SHA25650e0e8cccb99830edd923af88bcdc6ed56dce67f1817aa2eb2e66e1178fe3eba
SHA5124db05631f25a704f5c36530176320099b349984e5472da856c14911b236fd5646c52f5f9306d8625aa8e9cdbe55b9732e4d37bfacb5667197ff5102df998035a
-
Filesize
603B
MD5b32a5865a0fa61c5eb9fd095bd0dd365
SHA14583fad3a87f23e388eed7e14c4cdcb32be97ec7
SHA256c2d67156288fa2c8835ddf3a056066092483771d7a08a5e30654d17f6321ec4f
SHA512366381f7423dd5c4311b088e30f1796d1d86ca252dfa9fd3a8e285583d7f4b809fe1eec8d4e2f8df91f0fd098b9f9aa4b62a8f864a8c117d068c2144a45d90bf