Analysis
-
max time kernel
151s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 22:49
Static task
static1
Behavioral task
behavioral1
Sample
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe
Resource
win10v2004-20220812-en
General
-
Target
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe
-
Size
1.9MB
-
MD5
4def45e2c114c4463aa31cc470a329e0
-
SHA1
7105a22ffc93978697654e0ed4baf5990e2650eb
-
SHA256
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b
-
SHA512
d0d96c57f712e35fac0db26783deff646cc111561668695c7412113ceaf9e5c230e13fe9fab1dd0ae88bad897ca0d7efc777efa0b046f52df9534f9d7d2516f8
-
SSDEEP
24576:KRmJkcoQricOIQxiZY1iaLYus0JMmh1t1Sh2LRnevup7LddhFPa5Acksvom:PJZoQrbTFZY1ia0gJMmP+n
Malware Config
Signatures
-
NirSoft MailPassView 6 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/1376-58-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1376-59-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1376-60-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1376-61-0x000000000047E9EE-mapping.dmp MailPassView behavioral1/memory/1376-63-0x0000000000402000-0x000000000047EA00-memory.dmp MailPassView behavioral1/memory/1376-64-0x0000000000402000-0x000000000047EA00-memory.dmp MailPassView -
NirSoft WebBrowserPassView 6 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/1376-58-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1376-59-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1376-60-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1376-61-0x000000000047E9EE-mapping.dmp WebBrowserPassView behavioral1/memory/1376-63-0x0000000000402000-0x000000000047EA00-memory.dmp WebBrowserPassView behavioral1/memory/1376-64-0x0000000000402000-0x000000000047EA00-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1376-58-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1376-59-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1376-60-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1376-61-0x000000000047E9EE-mapping.dmp Nirsoft behavioral1/memory/1376-63-0x0000000000402000-0x000000000047EA00-memory.dmp Nirsoft behavioral1/memory/1376-64-0x0000000000402000-0x000000000047EA00-memory.dmp Nirsoft -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exedescription pid process target process PID 1976 set thread context of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30308C41-69F7-11ED-8CB6-56A236AC5043} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ed270b04fed801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da000000000200000000001066000000010000200000008aed564c42d02dc93504ac44048c396ba6fa12d3cee35a81e90156ee94b9b87e000000000e80000000020000200000005d0659b3cecd3738de9654a69b35cf94c24a563f9b3667e535dfea21be69fd1e20000000ef442bb33d97649e8143dc4dd6d733931129270685de85369b55e5422fec69bd4000000080a60528a920b6f263ae45fba16f2f7f8821b9e687b88d23827b8eb87d468493c1e790f03de79e36f1c7e2bd0edc0dc4bdf99d34b567696f2704778554e4697d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375839566" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exeiexplore.exepid process 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe 756 iexplore.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exepid process 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 756 iexplore.exe 756 iexplore.exe 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exea19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exeiexplore.exedescription pid process target process PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1976 wrote to memory of 1376 1976 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe PID 1376 wrote to memory of 756 1376 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe iexplore.exe PID 1376 wrote to memory of 756 1376 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe iexplore.exe PID 1376 wrote to memory of 756 1376 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe iexplore.exe PID 1376 wrote to memory of 756 1376 a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe iexplore.exe PID 756 wrote to memory of 1492 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1492 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1492 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1492 756 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe"C:\Users\Admin\AppData\Local\Temp\a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe"C:\Users\Admin\AppData\Local\Temp\a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=a19fb7204365c980e5f7f4f1d32b9c0896c18f57be083e2bf987f7eebdff581b.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4SBUOOYV.txtFilesize
601B
MD5fc363647caf266ba5af5068404e3364a
SHA13e39cfa5b8976335dfad6365cb205ab8159f0c78
SHA25697dc05a0ef37147008f7699712526bbba8c363dbe86833d444f0b5f36781afa5
SHA51211c41aa00de2ef438f61fc987cebbccf431f8b8f93ba887ee0948898c53f5869d505c3bfabe84d992633fff0fdb1eff9ec6adbe722148e1981104505c668bd9f
-
memory/1376-55-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1376-56-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1376-58-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1376-59-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1376-60-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1376-61-0x000000000047E9EE-mapping.dmp
-
memory/1376-63-0x0000000000402000-0x000000000047EA00-memory.dmpFilesize
498KB
-
memory/1376-64-0x0000000000402000-0x000000000047EA00-memory.dmpFilesize
498KB
-
memory/1976-54-0x0000000076651000-0x0000000076653000-memory.dmpFilesize
8KB