Analysis
-
max time kernel
245s -
max time network
251s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 17:51
Static task
static1
Behavioral task
behavioral1
Sample
BABB5BC09EFE7D42910D7504AC7F688F.exe
Resource
win7-20220812-en
General
-
Target
BABB5BC09EFE7D42910D7504AC7F688F.exe
-
Size
8.6MB
-
MD5
babb5bc09efe7d42910d7504ac7f688f
-
SHA1
a31961b8d0788212653815b897461b27b28760ae
-
SHA256
4125defe095eee3c1811a62a83c559602d0041d300a8e73ac0bb43b6e9de1db3
-
SHA512
d3bd647cfed02f6efbd3fa9a85fd27b2e86d8c678a256f23a007af08597657793790e37c4fbd00e22a0d4e864361ff589532ea5f38f1590cc6b5b723a7d461ab
-
SSDEEP
196608:28RdIDarx4UQ3tYMkZfn90quXSlnz8eryfu5m0iJ0VOLAwu:5etY/Zf90quXSljrH5mPJJAb
Malware Config
Signatures
-
Detected phishing page
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
BABB5BC09EFE7D42910D7504AC7F688F.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BABB5BC09EFE7D42910D7504AC7F688F.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BABB5BC09EFE7D42910D7504AC7F688F.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BABB5BC09EFE7D42910D7504AC7F688F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BABB5BC09EFE7D42910D7504AC7F688F.exe -
Processes:
BABB5BC09EFE7D42910D7504AC7F688F.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BABB5BC09EFE7D42910D7504AC7F688F.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
BABB5BC09EFE7D42910D7504AC7F688F.exepid process 560 BABB5BC09EFE7D42910D7504AC7F688F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375821736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACD7A821-69CD-11ED-8413-C22E595EE768} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000bed7870f7266648a49aaa7b802fafe400000000020000000000106600000001000020000000a232f67551fe79f8fae1a0d3da2d5b2a75d09f3347783b2b34609c1065a29ceb000000000e8000000002000020000000778e0be7c522bad4002d087719fce90a2981bb96521af5ce4ddc67211e8fc6f4200000001ebb3850acf4988dd2577a7da5a5ae745a493655f212fb2d4780119011bed9dc40000000e25bafcff219ed63194b2d94b1aced8736b64397d7127c2b880b453f8b8edeb6d5fde8590e5da975da1785f5953509ccf25cef5ec17d4d896b84b6529254589b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000bed7870f7266648a49aaa7b802fafe400000000020000000000106600000001000020000000c77ae403062ed44a04ad6de0e6ae17b516cdecc53cf49cfdb2116eb857158a46000000000e80000000020000200000000dd4eeca9bd550e24898d76bb5006cc613d432ab1dcba3f8638495b9085b6aba9000000075f948512d24fce482e246950517b8913663ba0e462251071a98d9dfc3e5619f0c87f44a63d6fc865df510f22ed51fac6f984e1a8d5ef3fbc2dbedfecd668f5c978a23846980998b8dc13717b7e911e8fe2a3c807f109f43b43352092dc2d775410e5dcecd8f43c8e5e1c421b57f49ee4e1beef0a9f7ba3fc3b8749715a2211e24a96246b6d4948e993da6571283267b40000000f266c29004f40465b10adefe05604d2a205aa1c8e791621e4cdbf224fb8c6b3695d337057a231aade79c28257d9638c0b32a42e2855085d91183c76b87cb5923 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02f708cdafdd801 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
BABB5BC09EFE7D42910D7504AC7F688F.exeiexplore.exepid process 560 BABB5BC09EFE7D42910D7504AC7F688F.exe 1880 iexplore.exe 1880 iexplore.exe 1880 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1880 iexplore.exe 1880 iexplore.exe 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
BABB5BC09EFE7D42910D7504AC7F688F.exeiexplore.exedescription pid process target process PID 560 wrote to memory of 1880 560 BABB5BC09EFE7D42910D7504AC7F688F.exe iexplore.exe PID 560 wrote to memory of 1880 560 BABB5BC09EFE7D42910D7504AC7F688F.exe iexplore.exe PID 560 wrote to memory of 1880 560 BABB5BC09EFE7D42910D7504AC7F688F.exe iexplore.exe PID 560 wrote to memory of 1880 560 BABB5BC09EFE7D42910D7504AC7F688F.exe iexplore.exe PID 1880 wrote to memory of 688 1880 iexplore.exe IEXPLORE.EXE PID 1880 wrote to memory of 688 1880 iexplore.exe IEXPLORE.EXE PID 1880 wrote to memory of 688 1880 iexplore.exe IEXPLORE.EXE PID 1880 wrote to memory of 688 1880 iexplore.exe IEXPLORE.EXE PID 1880 wrote to memory of 1540 1880 iexplore.exe IEXPLORE.EXE PID 1880 wrote to memory of 1540 1880 iexplore.exe IEXPLORE.EXE PID 1880 wrote to memory of 1540 1880 iexplore.exe IEXPLORE.EXE PID 1880 wrote to memory of 1540 1880 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\BABB5BC09EFE7D42910D7504AC7F688F.exe"C:\Users\Admin\AppData\Local\Temp\BABB5BC09EFE7D42910D7504AC7F688F.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.asys.co.za/2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:668685 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9bc2e1eff075f91680edacc4d2db477
SHA167311e4a92fa397abf554ffeb9b631c317ea5d36
SHA2564a3db50adfa8599b9eaae60475cdeb98e7bc7f630d2b3e355b07faece974bc4e
SHA512b96021c378bf4fe1773df2a59264567fbd5cfb60a35e7dba1b5afa2dbbf35b04d296ebd102f8928bacc61e8e4b6bc425829e7dcc20bc303960aabdb56d33bce7
-
Filesize
4KB
MD585f79396b248a4a96236dc969f831f0f
SHA1b6a16298f5141bac77a0a474abf17c148fa98c9b
SHA256e662fa43a86dedead19746e55bad99608eb0048f456841552a507bb0cd6a2904
SHA512301bf9f3e1a337426f05cbdfd2e13fad50c82c04a2a11578d6a63970bda35b4b29071885e97689ca661457d1f88309cba3bc5f8941b941693e5f58d991abb4da
-
Filesize
608B
MD5678c56277801d7073562a38d78af0a4a
SHA166942fa59e3dbe4918f52eca50c40cd570b64dbe
SHA256396b0f82d2e99a0c4d11c7e247e2f0058a6eea20fa0c42a6d8c14dbb6f19bf3f
SHA512b68920d385055a0159354b95f324f6d0eb092fef6618ca8a9b0f836d8fc454075c014c2a4cf5be3823f380965668ecb0ca3fb0bca81ebfe08625d3932e69fbb9