Analysis
-
max time kernel
119s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 19:18
Behavioral task
behavioral1
Sample
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe
Resource
win10v2004-20220812-en
General
-
Target
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe
-
Size
14KB
-
MD5
0de95947b0c7e4515e104eef17ea4322
-
SHA1
7926ebe1ac582c8ea7421fe4209ad2b8fe37957d
-
SHA256
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd
-
SHA512
f98be3d89105f296984a3232aecf27dce727d753cdff86585de94f261cde2d75123a5f494e07d6f8318b09c9bec3ae1b138b8870acf7bcb839abd8f34b7fc7d5
-
SSDEEP
384:byi8T5ePaOaNJawcudoD7UG5A4VoeM4mK:byXTKsnbcuyD7UgVDz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1108 b2e.exe -
resource yara_rule behavioral1/memory/1520-55-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1520-60-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1520 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 1520 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6015BE11-5F77-11ED-9F1A-42A98B637845} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000005c3b7e359d8fb877dcbdda14f31c909c09b6e54d705b30513680562132ac167e000000000e80000000020000200000005a9c61dbc880345a08987f1e14ead7290de27e1e2326641d9ae09dda2044070a9000000072fa1308605dc96253d38f5b2ad5edb9a46d5e65c64b7e76a4aeaabd18872219e17d49b6f8f98f076238732bb8b5d5b9b4b5cdd7767af593fb6bcd6dcfaa36b374d09cccd76951ffad5961ab217d045de1764f707f4c06dd5a6cc79766a17b31fb12d8f26334334443772f62ccab81d1762be06f6e12c8a5a28882c08b9f9b34ff6c2867a0504e7f15c88c6818fdbef040000000851bcd8a6fdb91fb1c8e1e547a1013552d09e8e0b7eec2e9025efb6517b262d108a4c8ecdc09c708e2bea216e82295ac33c48150c3f9bb49c561d33290e73d64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374685177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000007dcf5c4276b0665d8f22e7db0220aa92d4a98755506289431af6d02b12e293d2000000000e800000000200002000000075a7740439a36b8ee161a44750a1d73c9d48e803fa2e4277c3d854544c71e5d4200000005ec15cfa18599e0e76e7863d5476380b29ca52beb39932df0605d5e4c4c4ecf84000000086ab9756dde1fd382655ea1984f192104acf57369c4bce911c9cc7ab5126a9b5791e036f9768693a60a460ad996c8dbbd7ab1d6f402042527522dd53dcae415f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b6a33a84f3d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 932 IEXPLORE.EXE 932 IEXPLORE.EXE 932 IEXPLORE.EXE 932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1108 1520 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 28 PID 1520 wrote to memory of 1108 1520 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 28 PID 1520 wrote to memory of 1108 1520 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 28 PID 1520 wrote to memory of 1108 1520 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 28 PID 1108 wrote to memory of 1076 1108 b2e.exe 29 PID 1108 wrote to memory of 1076 1108 b2e.exe 29 PID 1108 wrote to memory of 1076 1108 b2e.exe 29 PID 1108 wrote to memory of 1076 1108 b2e.exe 29 PID 1076 wrote to memory of 2040 1076 cmd.exe 31 PID 1076 wrote to memory of 2040 1076 cmd.exe 31 PID 1076 wrote to memory of 2040 1076 cmd.exe 31 PID 1076 wrote to memory of 2040 1076 cmd.exe 31 PID 1108 wrote to memory of 1984 1108 b2e.exe 32 PID 1108 wrote to memory of 1984 1108 b2e.exe 32 PID 1108 wrote to memory of 1984 1108 b2e.exe 32 PID 1108 wrote to memory of 1984 1108 b2e.exe 32 PID 2040 wrote to memory of 932 2040 iexplore.exe 35 PID 2040 wrote to memory of 932 2040 iexplore.exe 35 PID 2040 wrote to memory of 932 2040 iexplore.exe 35 PID 2040 wrote to memory of 932 2040 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe"C:\Users\Admin\AppData\Local\Temp\8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\F7B8.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\F7B8.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\F7B8.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\F95D.tmp\batfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.regiedepub.com/cgi-bin/advert/getads?x_dp_id=434⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:932
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "3⤵PID:1984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD56a7329f15480d4ca075dd593c7572d14
SHA1cbe94a895b719efdb2309e2d3cdd469c5c5fef55
SHA25650c8fe18a33985b19b5a88d9d6d94193079aea9cfaa89be9b28ec771e04e4670
SHA512ba0a5b9fa41faadebe8124d44e03bb05fb5e6a9eec4052c90fc2d30852200e789b6183afd9deeea64c8aa944b8f28d6ef983dd64f1aaf581d930a98d5240f874
-
Filesize
8KB
MD56a7329f15480d4ca075dd593c7572d14
SHA1cbe94a895b719efdb2309e2d3cdd469c5c5fef55
SHA25650c8fe18a33985b19b5a88d9d6d94193079aea9cfaa89be9b28ec771e04e4670
SHA512ba0a5b9fa41faadebe8124d44e03bb05fb5e6a9eec4052c90fc2d30852200e789b6183afd9deeea64c8aa944b8f28d6ef983dd64f1aaf581d930a98d5240f874
-
Filesize
77B
MD5ba7c5c724c70ee9f04c4933b18083e49
SHA1d6c6dcbe9cbfb829296dc21ff41292cac64fdc9c
SHA256aad13997529ce15c8b987178057a01b5e8236f0daf5b94f29dabaa778105388c
SHA512d34f0f812c72580e1c505da5dfa636e18fea800cbf36e2ed11bfc423cf7a871981991b3a7e65e45b54aeb15f3f37f8eaef2e408a03585f2c46c95fbcbf63e09b
-
Filesize
158B
MD5c9667a06e1d40555c4b1b232cbbb561f
SHA187c376ed2b35d9be20c2457ce748ed089d9620ac
SHA25661057f44e5fb11a427742e32f4264024c08c93805155a2e33a582992680f0429
SHA512a18ed36487db0e7e082b5aed504ee58defef32757d48ab44d85344df2dc70612fbb5f5e2eb0ed38595b674e0d7e9cbddc5f27cac0653e5542a957439e8571f4c
-
Filesize
608B
MD5aa8790b75e8e394e883d97a2b20b9ac6
SHA1f42d5622181e4c9d03eabd3b704d553932cc0e89
SHA256f0687dd02a22d939232e725c29c4194d76c66571e565eeb881badd2c5f3e751f
SHA512c286a597428d2daf0295512aba8779e6498be61a972ed2afbde98dd71f802a27513e6449e5484644e4e3b8bc1ebf5df1be7c0dc0cb7035a4efe05456e9bc9c43
-
Filesize
8KB
MD56a7329f15480d4ca075dd593c7572d14
SHA1cbe94a895b719efdb2309e2d3cdd469c5c5fef55
SHA25650c8fe18a33985b19b5a88d9d6d94193079aea9cfaa89be9b28ec771e04e4670
SHA512ba0a5b9fa41faadebe8124d44e03bb05fb5e6a9eec4052c90fc2d30852200e789b6183afd9deeea64c8aa944b8f28d6ef983dd64f1aaf581d930a98d5240f874
-
Filesize
8KB
MD56a7329f15480d4ca075dd593c7572d14
SHA1cbe94a895b719efdb2309e2d3cdd469c5c5fef55
SHA25650c8fe18a33985b19b5a88d9d6d94193079aea9cfaa89be9b28ec771e04e4670
SHA512ba0a5b9fa41faadebe8124d44e03bb05fb5e6a9eec4052c90fc2d30852200e789b6183afd9deeea64c8aa944b8f28d6ef983dd64f1aaf581d930a98d5240f874