Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:03
Static task
static1
Behavioral task
behavioral1
Sample
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe
Resource
win10v2004-20221111-en
General
-
Target
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe
-
Size
239KB
-
MD5
3ea9fa6a4537b7b14c2ec7524637595f
-
SHA1
68ef6c162fb8c8a5dbae38102a746deb14c86dea
-
SHA256
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861
-
SHA512
d7eb9ce5badb529a11ce1a0cb2a8cbb9315852215fe1628f1e07a87973bdc6a80ffa7bc56f33267418663a1bf5f8278b8b6f6b05978997be6fa4f8cab39341f0
-
SSDEEP
6144:OQquwKtnUjtlDJtrUt3DDbr99kSXWOMyCgc4/cmvY:h3Up5v23N9LFDJFg
Malware Config
Signatures
-
Loads dropped DLL 12 IoCs
Processes:
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exepid process 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe -
Drops file in Program Files directory 1 IoCs
Processes:
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exedescription ioc process File created C:\Program Files (x86)\Funshion\Unload.exe 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D4C1AB1-6B2B-11ED-8538-4A4A572A2DE9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375971819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002d3bfcb6b4fe0a418cca1768ccc60c8d00000000020000000000106600000001000020000000931e30fb1af09328cdf83c8a5a02ff7003df03b8317fee6796b4c19b39df6c71000000000e800000000200002000000034b1b81136b2670f388a3ef874487d583d88eb1b07dc3e4ae4055276c0e150042000000040979d9f8a3904a70f8a1405708314455bf780af19c28561feb4cf4be634617640000000dba9557d11a8b543a7489e48e90061df271cad843019331bb23089cd511071ac1221230c6ad0d7e435d6d696938b904b7323dd495fa7586c2c2c888e0ef93e89 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 904e5cf937ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exepid process 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1760 iexplore.exe 1760 iexplore.exe 284 IEXPLORE.EXE 284 IEXPLORE.EXE 284 IEXPLORE.EXE 284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exeiexplore.exedescription pid process target process PID 1784 wrote to memory of 1760 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe iexplore.exe PID 1784 wrote to memory of 1760 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe iexplore.exe PID 1784 wrote to memory of 1760 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe iexplore.exe PID 1784 wrote to memory of 1760 1784 43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe iexplore.exe PID 1760 wrote to memory of 284 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 284 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 284 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 284 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 284 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 284 1760 iexplore.exe IEXPLORE.EXE PID 1760 wrote to memory of 284 1760 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe"C:\Users\Admin\AppData\Local\Temp\43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://f.shuianshanba.com/43b7b5a153edaa9f1c2024c8de66a9fcb53c2a3592d5c0a1c0bc6e9aab068861.exe/sohu.jpg2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD5b8a6352b0e6ecc1e945d0a1be1444373
SHA14080661898ed762d4aa40d06a945d6ca691de4c4
SHA2567da2f132c55dc931a8ee833238ba48a3f3eb069a1cfe94393ded0c845d06bdcc
SHA5123cf2c41aa4927a0734411e0119722b46007d8acbf50e94db60d6d05542c161b456d797f183673a1eba856b250d538de05ff1c14bc247b54ab8cf25fdde90a038
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f