Analysis
-
max time kernel
117s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe
Resource
win10v2004-20220812-en
General
-
Target
ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe
-
Size
681KB
-
MD5
0dd8a4305a7d22b2cb9472bba95bb3c5
-
SHA1
551c467515af3d25bb4686557d05bf16169f26aa
-
SHA256
ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44
-
SHA512
0cc4109a86e2f508eee91a4eea5dcb0531bb99d426646b2c4b4efceb77012900d03f8cf2e71e4c8b1eacc8ea0f4fbf18ef1d1f31897357703fa7039a63198c1c
-
SSDEEP
12288:v0aOMEz2DmXYj1F9n5TBT3SXW3YoJ06N2xOqkaAqeUe532rGzduuSK:cEEbXYzogatKuGzduuSK
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1184 ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe 1184 ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe 1184 ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c0000000002000000000010660000000100002000000029e8cc9cb76cf34192808b740f6fef00798e81413e3b4701bd8235427cbb14b8000000000e800000000200002000000054c99866e33af9cc1f3cb28d662a073fb7aeaeb9073963416c1f6254c9e741d92000000032419cf45b4537e968ceb73b5090d4b385ac8bb8915bfd6d39911ef615da7dca40000000a7c1b8fcdd2e9218d079e7ff1f7867fc7048e750ab238cd62b3468e41345f230bd144ff873221435b93cbb975965b804bd74db34db9b932739ff72fa796043b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106c06c6f9f1d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E67E3811-5DEC-11ED-8C11-42FEA5F7B9B2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374515740" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1648 1184 ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe 26 PID 1184 wrote to memory of 1648 1184 ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe 26 PID 1184 wrote to memory of 1648 1184 ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe 26 PID 1184 wrote to memory of 1648 1184 ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe 26 PID 1648 wrote to memory of 1960 1648 iexplore.exe 28 PID 1648 wrote to memory of 1960 1648 iexplore.exe 28 PID 1648 wrote to memory of 1960 1648 iexplore.exe 28 PID 1648 wrote to memory of 1960 1648 iexplore.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe"C:\Users\Admin\AppData\Local\Temp\ae81d99d2833de1f4d64b579ceef51c2a17155f648c129c2fa2ea8ba74afdc44.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://plugin.chameleontom.com/?aff=12⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD567e8b18b8db7c163f6b53593fe567ffd
SHA1e2f9d4e1851f862957e0bb980ec4bb406b6fd134
SHA256da6ae7ef27a4f3bc5fa9367f5ee20f74166aafb0268476654171151d151eb7d6
SHA51232222c549be431c31cf3f54346fec5e8b19999b8ad13fdb0447a9da62f42b30139a483a71f2cfe5602006bcfb9549a6a5673b087a895d7ead5f91c90d6e2af7a
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
60KB
MD5926e4475c00fb5254c32c876921b77d0
SHA18a55bc8b6e49021a4abbd441783c41d5e019798b
SHA256d54c8582863c079996c4f1113b1c106204773ad9ea2ae831ba2b33b45bafdfa8
SHA51253f389e1a967c123ed591c7650cf6d3140abf1012dcac90faf2327e68558949eb2b19905098bd14ab3a9811d23f98466f88418d992ca6373f94afae56a285bd8
-
Filesize
157KB
MD5dcf180c820c7eca0409eca7c32e12cb2
SHA1655984847eb8c4a244742ce99316bae8a0cc7515
SHA256204199949dabc9708cd1e8f0fa40f37d7889f04b0b1b072599a8481bd97bede0
SHA5129efbe1af3488278f9888708503d4cb2b505d57e63626c4261583d870ae7a04d1002ac24599fc7cfeb3bf7a718177d5645e8227ea48f63e98e540340b3ab7f420