Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:04
Static task
static1
Behavioral task
behavioral1
Sample
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe
Resource
win7-20221111-en
General
-
Target
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe
-
Size
184KB
-
MD5
a1608b21962b1fef1e87948753a8d3d2
-
SHA1
3215288dd5ecf93b00cee7cb5670966e8f44cfb0
-
SHA256
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6
-
SHA512
efeaf181ebfd6c342e513691db4948e024f02b701de63f2bd620bcf546b4678a9041a3245086091d48bab2bbe736f9763621a3f85b55a5da4fc5810b7b3ccdc9
-
SSDEEP
3072:84r0/5Q3FosIbwKkD07DeDrVBRpg5uJBm0RcOIJ8z:84QRGFqMh07DeD9pg5mB/2OIJ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
servicesc.exepid process 3984 servicesc.exe -
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cbs.nl 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\opendata.cbs.nl\ = "18" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cbs.nl\Total = "18" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cbs.nl\Total = "0" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\cbs.nl\NumberOfSubdomains = "1" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\opendata.cbs.nl 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\opendata.cbs.nl\ = "0" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DOMStorage\cbs.nl 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe -
Modifies registry class 1 IoCs
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{8CD98A28-F702-4B87-8518-37A5AF1459BE} 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
servicesc.exepid process 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe 3984 servicesc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exeservicesc.exepid process 5052 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe 5052 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe 5052 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe 3984 servicesc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exedescription pid process target process PID 5052 wrote to memory of 3984 5052 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe servicesc.exe PID 5052 wrote to memory of 3984 5052 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe servicesc.exe PID 5052 wrote to memory of 3984 5052 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe servicesc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe"C:\Users\Admin\AppData\Local\Temp\570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\servicesc.exeC:\Users\Admin\AppData\Local\Temp\servicesc.exe 570fe93bd1174b7de1981d446f329e9a60eea247bce9d31486a4dbba6376aef6.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5d542fd20caac2c34bbec498c05b0d828
SHA15deb07503e212e23e1f6d23b7fd93289da20061f
SHA256d74fca83e5cf20d9081e099a12e9c70d8c6ecaf52f4ec2963246353dc447b666
SHA5120e853a822008229b81a89ebc80d0d7beef08c45471cf4a2d6eb12aa1e19d56c96b6f7ae18f49cc2c317941b2a1c18be6211e8447b22eb5498dbcd17a8ea5c78b
-
Filesize
32KB
MD5d542fd20caac2c34bbec498c05b0d828
SHA15deb07503e212e23e1f6d23b7fd93289da20061f
SHA256d74fca83e5cf20d9081e099a12e9c70d8c6ecaf52f4ec2963246353dc447b666
SHA5120e853a822008229b81a89ebc80d0d7beef08c45471cf4a2d6eb12aa1e19d56c96b6f7ae18f49cc2c317941b2a1c18be6211e8447b22eb5498dbcd17a8ea5c78b