Analysis
-
max time kernel
226s -
max time network
231s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21-10-2022 10:18
Static task
static1
Behavioral task
behavioral1
Sample
myfile.exe
Resource
win10-20220812-en
General
-
Target
myfile.exe
-
Size
4.3MB
-
MD5
cde3f2732fcf5a3b990fd6e33c6757cf
-
SHA1
3e6903a3635ae53207bfdbc98119860e924fe839
-
SHA256
e3942b398296e89e5f5ace5f17b52540e6a2543248b3c7992e19a0688befca13
-
SHA512
f9cbfffecacfd31cb42d6a25baa0ef697f185d403b65439161ce8167aa791f616f529fc01886360b88da085ca2818c503fa9c003341202b83c7cab1e0d232e89
-
SSDEEP
49152:y/pJyy4FUXoebtp7JRSFV30nQhbWE/Hb2X8CWmxWTjv/+WNptHJymrgs:8wU4e5f0/knsbNjv/+S
Malware Config
Signatures
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\OpenRead.png => C:\Users\Admin\Pictures\OpenRead.png.eduransom myfile.exe File renamed C:\Users\Admin\Pictures\SearchHide.png => C:\Users\Admin\Pictures\SearchHide.png.eduransom myfile.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 7 Go-http-client/1.1 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "@%CommonProgramFiles%\\Microsoft Shared\\Office16\\oregres.dll,-3" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files\\Microsoft Office\\Root\\Office16\\WINWORD.EXE\" /n \"%1\" /o \"%u\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files\\Microsoft Office\\Root\\Office16\\WINWORD.EXE\" /n \"%1\" /o \"%u\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "@%CommonProgramFiles%\\Microsoft Shared\\Office16\\oregres.dll,-3" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\SOFTWARE\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4152 WINWORD.EXE 4152 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE 4152 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\myfile.exe"C:\Users\Admin\AppData\Local\Temp\myfile.exe"1⤵
- Modifies extensions of user files
PID:3824
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4404
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\README.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261B
MD5221d3eb3b9bbb02dbb399e38c4358597
SHA17d316ec74f09e503265b4c233d9fd89dcd35cdf2
SHA256ff0373d4c2c4542c96ecafe3df741fae165824272ad66bea20080b0d7c81b60b
SHA512b329f7b4637666d0ccb4f4572f1bcdf903cf7f4d188d789d2cac9c5d2739634e8559b27c1a90b0911bb344e801669292dfc24c65e6d4ca3260b72e2f4d3a52d5