Analysis
-
max time kernel
115s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe
Resource
win10v2004-20220901-en
General
-
Target
92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe
-
Size
162KB
-
MD5
82530b6197a1c4a5e83c8049b7e93e70
-
SHA1
725d896d3a2a68c9053caf1a5dc693a3cfa6adc8
-
SHA256
92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999
-
SHA512
5e3caaf64497d1e1e46c785512edee4d5db185c10d1600c01fdc23bc1866ca943192d23bea8bc0019e38e7a84a3f9b194348d1d1b901400a2f5b93282dc2f024
-
SSDEEP
3072:CulbGXMwcgrRYYktRSflQ2Kk9OSiXK4j3/dF7ZajG46EgMOEyKgw4PWQ3YxpeuB:9bQhxnKWDb4j30jG9wgw+WQyPB
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\avast2006.exe 92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903bcef70fedd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DAD1DE1-5903-11ED-BD9E-FAB5137186BE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373975522" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf00000000020000000000106600000001000020000000c59d73e529777bf951c7f1984f51d148247078a00147259fe14423f61bac6028000000000e80000000020000200000000b58fdcc58e9b330a1913bdbf360a4499452f235ceaef40907f18451a77ddba920000000bd012003aa39046d2166f979e3110623d355837514b538bff60b4f57c5688f0f4000000048e3491b2f5a45e7a6429cab769d90101938d098a7bbd96cfbb16c958dbaca3e979f2d4c279490d494b14e09693e094e301be7702c6437e5fc94a810f0c9060e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf00000000020000000000106600000001000020000000215981d134f17f66f792789a14e18904e854a61c8cacc1c474bad6e6176897e8000000000e8000000002000020000000647e28e6ffa7fc453fbc4072ec5dcaee38752278401a484195b5354ffeb5b61490000000760084840b766dfd7ee886c891f0e835d80776b0b137cb37b1d2bf8d77540f38ee003705ba81453e1d38574d3660847686378afd1afe22f109f9cd60029fd3dbd340007bf02c756003d1cc84eb62f69180e0515cff1d3c2dae5728a17388ddbe1de759e469af629af847e3be797ec7219610c04047a9e6486c608bf5ecf8f11b9acdb00c63245e47a78b6394c95183dc400000001146ebb37820492238788e4afe3585e668738c3e03ff4ef3e0b0dfd18bde6d5d4df8f81ebe7a8ecf5de613d6ab31cdaa652388eea8f23f153a88066b16f5f557 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 520 iexplore.exe 520 iexplore.exe 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 520 1620 92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe 29 PID 1620 wrote to memory of 520 1620 92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe 29 PID 1620 wrote to memory of 520 1620 92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe 29 PID 1620 wrote to memory of 520 1620 92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe 29 PID 520 wrote to memory of 1072 520 iexplore.exe 30 PID 520 wrote to memory of 1072 520 iexplore.exe 30 PID 520 wrote to memory of 1072 520 iexplore.exe 30 PID 520 wrote to memory of 1072 520 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe"C:\Users\Admin\AppData\Local\Temp\92f59b52b881f486de931fc16b03e836e92b090b10dfe8b352f4f11ea9602999.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://hometown.aol.com.au/imagemarquivos/relatorio.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a819f8cd3a1289f33d65cb1265971006
SHA115f7dae0e868cf6a8f59380b63906e15e464d7e7
SHA25676667936cd653155b939d63343bc4895131861b55ab087457ac743b24298e281
SHA51245ed2385952b1fd65787d0ecf0f75e95e1368fca4036f60dc210bc056cc61ad3a9a452efdafee5a22f71502f2df2f6833f73be458729648471fedc1f609165c0
-
Filesize
603B
MD58fa46e17ebb11cfe4fcac5adf47aadfb
SHA1d9c7f26e182acfc115293c16eb68a93aeccbbc58
SHA256af5a8a1425df7c96a5b3d709fffdeb3509a9f23d320715087d4b8a2f2adcbfb0
SHA5129e28351b4dff38c30aff0b819ad0b79dde5a16f0b1fd139d83f96acc8f8c4f70d28da7166407b82a39e2dec303a386d7ad3d3f9b504e7638c40a671d9c6ff0bf