Analysis
-
max time kernel
152s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2022, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe
Resource
win10v2004-20220812-en
General
-
Target
8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe
-
Size
567KB
-
MD5
6e5cbd1e6931541e62486c44359ca910
-
SHA1
aee21d1b22483ae6894ddb153d21e21aa1b67d53
-
SHA256
8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9
-
SHA512
d6538b04af136240486887f801b0fb9be59e5427963fb2d694ac1928456bbc3b72f730548ec7dc2c293d4719921f425b4bd4bf73008128f8254ccd102606d4bb
-
SSDEEP
12288:Ojb+WVok0w3pY6CY4I7cPD7tyttf1/epQS5lUZ4hFvKBLGjSLfU+6Zu:wXVR0w3pYIu1c/8QSL9nyaSLsM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0620ca82ee5d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373109107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2654073168" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0af369e2ee5d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975fab978604b14697eb522259e91a10000000000200000000001066000000010000200000006f7e2d0be9ac2abd435060be29c6f5885159c9b4f5cf67391383f44fb44987fc000000000e80000000020000200000005454ea9ff0834ec9872bbb094d7589761cfeebaeb1e9d3a63226be724e44f1432000000077dcb710f61b783ae171c43962829b1dd0c96d725731e83d4ed7cfa60b6a9d0240000000d1cbb82df8b27810fdc376a7860bd6f914ebbce90c79840b4b97c188c1d8ce2b812af986cbce19f27695d434de1e42de0843025beb71ead96d7da7cc535692a3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991662" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975fab978604b14697eb522259e91a100000000002000000000010660000000100002000000049b7bf74666a26fe23e04295131bee212b1503fd3b346d9fb042db376f7fadf7000000000e800000000200002000000064d8460f215eeca72f642059b8ad687e4467d4ab49936e6ad56a55f9dece83ba20000000d0dcabb6714359d4fe2bcc0a4e460691cf4064dfbcbc98271a50182704a2cf5d400000002cf41ab65605905aa0f8852afb3aec6b6b025227d4d7fa1c09e0e8d4e00fa89b92ba574d47af9142e496b09dbae502e0c336470939d79a1cee470eb65dd67be2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2819386127" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991662" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2654073168" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991662" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C4B0419A-5121-11ED-89AC-5E3721E937B7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2819386127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4880 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe 4880 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe 4880 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe 4880 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe 2088 iexplore.exe 2088 iexplore.exe 260 IEXPLORE.EXE 260 IEXPLORE.EXE 260 IEXPLORE.EXE 260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2088 4880 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe 83 PID 4880 wrote to memory of 2088 4880 8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe 83 PID 2088 wrote to memory of 260 2088 iexplore.exe 86 PID 2088 wrote to memory of 260 2088 iexplore.exe 86 PID 2088 wrote to memory of 260 2088 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe"C:\Users\Admin\AppData\Local\Temp\8305072985285329454d1e95addcc23515dc5d1d569da32dec90ed8dc43413f9.exe"1⤵
- Checks computer location settings
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.dnfxiaoyao.com2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:260
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
Filesize1KB
MD58d6776475ca38542b9dbe64bb72fe39b
SHA16d23a3b1d4e4f439c161608d44cfa886f316fd93
SHA256e693edc50280c612b17c433cfb31240c76dd818a44f76d353a63caa56831e1f8
SHA5129283133fef2b578391337e302e714b61e94c71997b47dbb602645ef28e7e518f8027f8a3368bb24471d4b35746aba55d187876f9f90df963e687e008a865a4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
Filesize446B
MD510d1bdbb992f049aa76ace4c17e71b22
SHA1f2524402a3b3133d36ebb3b4cc1a380de1ee4a6c
SHA256b3a713d7fa4d12b8a6fb279d0f2e5afdd650d4c12eb1613252546422f0a2a30b
SHA512532c18106a0ecb642295e55dde37c946a226bc2e0a85d6004e0bc267cadf42ac49a13672bd3a40d609befd5da10a4a0eee734b95ae500d59369fd1e083b268df