Analysis
-
max time kernel
79s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe
Resource
win10v2004-20220812-en
General
-
Target
172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe
-
Size
407KB
-
MD5
0ac59133410a2dae4034ca65947894f7
-
SHA1
66cc95aa2eead2b5323fd4237887d947c9365993
-
SHA256
172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031
-
SHA512
76e65b0582ddb5c9c0e66dc5fe0c56159ec3a43ecc84c998f303b179430ef5b0791207520f0653994f244b96018acdc224b1a7b1752493261c101608108b7ca0
-
SSDEEP
3072:vsBD6HJfcDDXJ8DRF+SKfJkuPutWiOIyZmzzu:vPpKCDRF+SKBkuPutWiOIFfu
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373773623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000155ddacc2ecb2f016faf6eef4f6c2755718e9c1225ff98513ba8f2e8687ed75f000000000e80000000020000200000005ec55f4566a7ca7cd18e39b448e982d632c18de0d14f425d646a13f01dd5baf020000000a4930afe4ea93f7ad126c55c47e0eb2d767b07ff95d18acf817d4ee5e1219649400000003fde91547546d806f6d3a8fa5cb83c363b7bf4d2c652903ceae3911827a8c55a217a3797bbd034b054a318e8f24c757f613ca28f99ed9753b94833f559687681 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0ABB76A1-572D-11ED-BBEF-F2255ECFD43B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c364e139ebd801 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1388 iexplore.exe 1388 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1388 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe 29 PID 1308 wrote to memory of 1388 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe 29 PID 1308 wrote to memory of 1388 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe 29 PID 1308 wrote to memory of 1388 1308 172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe 29 PID 1388 wrote to memory of 1660 1388 iexplore.exe 30 PID 1388 wrote to memory of 1660 1388 iexplore.exe 30 PID 1388 wrote to memory of 1660 1388 iexplore.exe 30 PID 1388 wrote to memory of 1660 1388 iexplore.exe 30 PID 1388 wrote to memory of 1660 1388 iexplore.exe 30 PID 1388 wrote to memory of 1660 1388 iexplore.exe 30 PID 1388 wrote to memory of 1660 1388 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe"C:\Users\Admin\AppData\Local\Temp\172c80c4b27d5de620bad47ce28da191abd6a538b59388ff02bad7055acd8031.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.hopdream.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca44c9f6a56b8da2f72045af8fcfdb9
SHA1442262dd515b08a413f0a1b86917e742f5908194
SHA256c44a41d285167e1ffeca3e669ffeef5712622c4546c5150e621ba674afe1f556
SHA512f4ed58945819dda23e2195af9371572bfe85316b944ad43fafabc498b0e22328b4a964adce2ea2baf760c42232cbe5257ef3e26c3cfe9ec38186b2ce10acb12a
-
Filesize
608B
MD5c24d890369db761f4c6c3a8350dad078
SHA1df45d807a8fba414ffbc78af3e9aecca0a8fdb76
SHA256d87d86bbfc65b0d89c00fd097a94ff45977879ce5f5fbe6e69d37ce912999a02
SHA512a57de6751e93fbc63bbaaef160df831fc6203671b648cdde4cae2377068ffdb733848437f31c2271a3683121d81386288d07204d3f50cdf6f6b5366cf7b752b6
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c
-
Filesize
20KB
MD5e541458cfe66ef95ffbea40eaaa07289
SHA1caec1233f841ee72004231a3027b13cdeb13274c
SHA2563bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420
SHA5120bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c