Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe
Resource
win10v2004-20220812-en
General
-
Target
d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe
-
Size
7.7MB
-
MD5
fd9f596b0d88024cffa94540cb837e6b
-
SHA1
85704c78d3726ac45ff0fc9b6504873a56a8094c
-
SHA256
d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2
-
SHA512
47154c927ea66deef12e4f4ebbfa11e115afd9a484b2015a64f018ca9a1568b5de1692a1315b492d4f79b8721a7dfa2728a2c10a3717d6dce550e0761928b7e5
-
SSDEEP
196608:d/p7W7CxzD/64edSppgTeFCa28Ry4SaZywpBwO3+76sdZGat4r:dx7Yw3/iSpeU3ZRjJyw7wI+71rGat4r
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
HOST.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts HOST.exe File created C:\Windows\System32\drivers\etc\__tmp_rar_sfx_access_check_7086548 HOST.exe -
Executes dropped EXE 2 IoCs
Processes:
HOST.exeIDM.exepid process 820 HOST.exe 1624 IDM.exe -
Loads dropped DLL 9 IoCs
Processes:
d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exeIDM.exepid process 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe 1624 IDM.exe 1624 IDM.exe 1624 IDM.exe -
Drops file in Program Files directory 64 IoCs
Processes:
IDM.exedescription ioc process File created C:\Program Files (x86)\Internet Download Manager\Toolbar\metro.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Buttons.tbi IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\Primo.tbi IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\3d_large_3.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_src.lng IDM.exe File created C:\Program Files (x86)\Internet Download Manager\REG.reg IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\Dtu_Style\Dtu_Style-Small_Disabled.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\GlobeHot.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Cubic3D_Toolbar\H3M_Cubic3D_Small_Normal.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Glossy.tbi IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\idmindex.dll IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\8.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\Ultimate3D.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\IDMGrHlp.exe IDM.exe File created C:\Program Files (x86)\Internet Download Manager\idmmkb.dll IDM.exe File created C:\Program Files (x86)\Internet Download Manager\idmwfp64.sys IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\IDMSetup2.log IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_ar.lng IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Painted_Stickers_Toolbar\H3M_PS_Small_Normal.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Languages\idm_ru.lng IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Languages\inst_ru.lng IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\7-IDMHot.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\Bils_Style IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\Blue_Arrow_Mini_Hot.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\IDMNetMon64.dll IDM.exe File created C:\Program Files (x86)\Internet Download Manager\idmvs.dll IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\3d_smallHot_3.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\MosI3D_1.tbi IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\Primo.tbi IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\IDMGetAll.dll IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Glossy_Toolbar\H3M_Glossy_Small_Hot.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\idmtdi.inf IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\GS.L\GS.L3d_small_3.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Painted_Stickers_Toolbar\H3M_PS_Large_Hot.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\scheduler.chm IDM.exe File created C:\Program Files (x86)\Internet Download Manager\defexclist.txt IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_fa.txt IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_th.txt IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\Blue_Arrow_Hot.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Glossy_Toolbar\H3M_Glossy_Large_Normal.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\round.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\idmcchandler2.dll IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_de.lng IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\Skin2\3d_large_3.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Cubic3D_Toolbar\H3M_Cubic3D_Small_Hot.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Painted_Stickers_Toolbar\H3M_PS_Small_Normal.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\IDMIntegrator64.exe~~ IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\idmtdi.cat IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Languages\idm_fr.lng IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\H3M_Cubic3D_Toolbar\H3M_Cubic3D_Large_Hot.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_it.lng IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\ios7.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\kiti.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Languages\inst_cht.lng IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\Dtu_Style\Dtu_Style-Small_Normal.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\Zeolite\3d_large_3.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\kitiHot.bmp IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\ios.tbi IDM.exe File created C:\Program Files (x86)\Internet Download Manager\idmbrbtn.dll IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Languages\idm_nl.lng IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_ptbr.lng IDM.exe File created C:\Program Files (x86)\Internet Download Manager\Toolbar\Bils_Style\bils_style-Large_Hot.bmp IDM.exe File opened for modification C:\Program Files (x86)\Internet Download Manager\Toolbar\GS.L\GS.L3d_smallHot_3.bmp IDM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 1372 regedit.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exeIDM.exedescription pid process target process PID 684 wrote to memory of 820 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe HOST.exe PID 684 wrote to memory of 820 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe HOST.exe PID 684 wrote to memory of 820 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe HOST.exe PID 684 wrote to memory of 820 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe HOST.exe PID 684 wrote to memory of 820 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe HOST.exe PID 684 wrote to memory of 820 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe HOST.exe PID 684 wrote to memory of 820 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe HOST.exe PID 684 wrote to memory of 1624 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe IDM.exe PID 684 wrote to memory of 1624 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe IDM.exe PID 684 wrote to memory of 1624 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe IDM.exe PID 684 wrote to memory of 1624 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe IDM.exe PID 684 wrote to memory of 1624 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe IDM.exe PID 684 wrote to memory of 1624 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe IDM.exe PID 684 wrote to memory of 1624 684 d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe IDM.exe PID 1624 wrote to memory of 1372 1624 IDM.exe regedit.exe PID 1624 wrote to memory of 1372 1624 IDM.exe regedit.exe PID 1624 wrote to memory of 1372 1624 IDM.exe regedit.exe PID 1624 wrote to memory of 1372 1624 IDM.exe regedit.exe PID 1624 wrote to memory of 1372 1624 IDM.exe regedit.exe PID 1624 wrote to memory of 1372 1624 IDM.exe regedit.exe PID 1624 wrote to memory of 1372 1624 IDM.exe regedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe"C:\Users\Admin\AppData\Local\Temp\d22d57bcf039041fd0b1f0792293fae6d47f24919b147abc5ba6351a0eb6a5c2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\HOST.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\HOST.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\IDM.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\IDM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /S reg.reg3⤵
- Runs .reg file with regedit
PID:1372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b5a4d7472c0cea64a0b2f02a4c15aa5b
SHA12a1b37222568bf0571ff23248497cab0ff1b66bf
SHA256570d4af82f9892fcc84c9205d38da0713a596f9fcaf944a65494ac47bdfd98f4
SHA512c048c6196ea2eef0cc60f4472b71ecc7dc5f9813168c8bbfd8d5fdd013d8ad543fc802c793ba462985505d4c5b89a2cd473724cf9d4cf873a8391f0f5d90d8c5
-
Filesize
97KB
MD54cf55abdd357a8284a5a8a4e9238541d
SHA17aaa62953f24552b1427973d72f4220715004626
SHA256449bad57a49cbb06d13723fd534df9223490b3c76a62fda4052d778e3335c970
SHA512aaf7041d9ed9287060db7c77782e580cfb8aca5c9495c638a3128971cadf786d1b93fe0ae0f6ddde4431d6f171e9051992fa05af6091e83cdf627c91909f4978
-
Filesize
97KB
MD54cf55abdd357a8284a5a8a4e9238541d
SHA17aaa62953f24552b1427973d72f4220715004626
SHA256449bad57a49cbb06d13723fd534df9223490b3c76a62fda4052d778e3335c970
SHA512aaf7041d9ed9287060db7c77782e580cfb8aca5c9495c638a3128971cadf786d1b93fe0ae0f6ddde4431d6f171e9051992fa05af6091e83cdf627c91909f4978
-
Filesize
7.4MB
MD50ccbff0f52ecfeee22366fa7c19e7cfb
SHA1124f5094947e1877fc6cb7a5ffe6c750a0109061
SHA2563f5564bc8e7aad593eccbdc9c4cbaf52f9c36e40c496586067f32c304c179c15
SHA5127c507b6faa53fd835be2fc8d315366810b7528fd1216b1342c5358047cf49bb4a71d8520974777e655a35579af28fee2fb5e86772d033078c78af8b0d2fa3f46
-
Filesize
7.4MB
MD50ccbff0f52ecfeee22366fa7c19e7cfb
SHA1124f5094947e1877fc6cb7a5ffe6c750a0109061
SHA2563f5564bc8e7aad593eccbdc9c4cbaf52f9c36e40c496586067f32c304c179c15
SHA5127c507b6faa53fd835be2fc8d315366810b7528fd1216b1342c5358047cf49bb4a71d8520974777e655a35579af28fee2fb5e86772d033078c78af8b0d2fa3f46
-
Filesize
3.7MB
MD5622e59ef2780c0751330be740af77517
SHA11579e745beb995923c5100fe78e59746c3b51d5d
SHA2566d602e8cad22f647a879050e76aff7a80e77ea64bcff81c2ba0345787066a5e7
SHA51260348fe4209e68d336bfdcb18ff03a9e4cd8ec1835b7420464e65c934a3a0d5bff6472b8bc20aca1d1fb48f59602312e2509f06dac7c88aba077fcd1f532a369
-
Filesize
3.7MB
MD5622e59ef2780c0751330be740af77517
SHA11579e745beb995923c5100fe78e59746c3b51d5d
SHA2566d602e8cad22f647a879050e76aff7a80e77ea64bcff81c2ba0345787066a5e7
SHA51260348fe4209e68d336bfdcb18ff03a9e4cd8ec1835b7420464e65c934a3a0d5bff6472b8bc20aca1d1fb48f59602312e2509f06dac7c88aba077fcd1f532a369
-
Filesize
175KB
MD56649e522ffb939aad03d70f4b5e2964d
SHA181350188dc28f6f7090ea77a0e5c4f4d275a6b81
SHA2564b52f2d7c70cbdba1d2ce545beddc1d29bfa7ffd82ade6a2c35e8091d2c7148a
SHA51212e194a6b634b15be1a8e2d06fe9905176e08b033aa416e3582c77d0e20b5557e2b09f9a3707913bea25977d8efbb647827a74fa9ddb8b85c42d247b665fb640
-
Filesize
97KB
MD54cf55abdd357a8284a5a8a4e9238541d
SHA17aaa62953f24552b1427973d72f4220715004626
SHA256449bad57a49cbb06d13723fd534df9223490b3c76a62fda4052d778e3335c970
SHA512aaf7041d9ed9287060db7c77782e580cfb8aca5c9495c638a3128971cadf786d1b93fe0ae0f6ddde4431d6f171e9051992fa05af6091e83cdf627c91909f4978
-
Filesize
97KB
MD54cf55abdd357a8284a5a8a4e9238541d
SHA17aaa62953f24552b1427973d72f4220715004626
SHA256449bad57a49cbb06d13723fd534df9223490b3c76a62fda4052d778e3335c970
SHA512aaf7041d9ed9287060db7c77782e580cfb8aca5c9495c638a3128971cadf786d1b93fe0ae0f6ddde4431d6f171e9051992fa05af6091e83cdf627c91909f4978
-
Filesize
97KB
MD54cf55abdd357a8284a5a8a4e9238541d
SHA17aaa62953f24552b1427973d72f4220715004626
SHA256449bad57a49cbb06d13723fd534df9223490b3c76a62fda4052d778e3335c970
SHA512aaf7041d9ed9287060db7c77782e580cfb8aca5c9495c638a3128971cadf786d1b93fe0ae0f6ddde4431d6f171e9051992fa05af6091e83cdf627c91909f4978
-
Filesize
7.4MB
MD50ccbff0f52ecfeee22366fa7c19e7cfb
SHA1124f5094947e1877fc6cb7a5ffe6c750a0109061
SHA2563f5564bc8e7aad593eccbdc9c4cbaf52f9c36e40c496586067f32c304c179c15
SHA5127c507b6faa53fd835be2fc8d315366810b7528fd1216b1342c5358047cf49bb4a71d8520974777e655a35579af28fee2fb5e86772d033078c78af8b0d2fa3f46
-
Filesize
7.4MB
MD50ccbff0f52ecfeee22366fa7c19e7cfb
SHA1124f5094947e1877fc6cb7a5ffe6c750a0109061
SHA2563f5564bc8e7aad593eccbdc9c4cbaf52f9c36e40c496586067f32c304c179c15
SHA5127c507b6faa53fd835be2fc8d315366810b7528fd1216b1342c5358047cf49bb4a71d8520974777e655a35579af28fee2fb5e86772d033078c78af8b0d2fa3f46
-
Filesize
7.4MB
MD50ccbff0f52ecfeee22366fa7c19e7cfb
SHA1124f5094947e1877fc6cb7a5ffe6c750a0109061
SHA2563f5564bc8e7aad593eccbdc9c4cbaf52f9c36e40c496586067f32c304c179c15
SHA5127c507b6faa53fd835be2fc8d315366810b7528fd1216b1342c5358047cf49bb4a71d8520974777e655a35579af28fee2fb5e86772d033078c78af8b0d2fa3f46