Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:48
Static task
static1
Behavioral task
behavioral1
Sample
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe
Resource
win10v2004-20220812-en
General
-
Target
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe
-
Size
174KB
-
MD5
3b2b5d67d1a0d46e23dcf1119622c24c
-
SHA1
ab439ac8c47f84407681b2c51a61dce8005ddcc4
-
SHA256
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720
-
SHA512
d758fc65b02f7eb504a83573a32054e735d99ef9461a904b590fbbee59cdf964d3aeb01b51a5bc662ebe9deed16d17a98a88e3d31d51b4610ef9dc3330e5c319
-
SSDEEP
3072:qgXdZt9P6D3XJE45OBOfOZFCdrh2QznsTXC2NKMcyha0nKucir3T3T3aDgtUrPdp:qe34+B4kFCdKXC2NIyha0Gu3TzaPbdp
Malware Config
Signatures
-
Loads dropped DLL 15 IoCs
Processes:
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exepid process 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe -
Drops file in Program Files directory 1 IoCs
Processes:
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exedescription ioc process File created C:\Program Files (x86)\DriverSoft\Unload.exe c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 2 IoCs
Processes:
resource yara_rule \Program Files (x86)\DriverSoft\Unload.exe nsis_installer_1 \Program Files (x86)\DriverSoft\Unload.exe nsis_installer_2 -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fd1da0bf6b4444b84ae796a60d7adc100000000020000000000106600000001000020000000072420cdbb02f5dd7a7e530d522bf1002ce42f0ad8ab37acb800ef8cc322540c000000000e8000000002000020000000f74939533f98dd198c77eabab2d3e29b6de1bf8f4b4604989272950bcd179ba5200000006b5c7293192567dea1df318931b32a784bef3628594427a184229661ac16c6f240000000bb48da578da0c6f47b8227ba589106bc96ad28327369929a86dee59dfb29c04b44071df31b6f1f537539f6052953cd87b04f3d8288f9b2880dcf9ad7723aba51 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8797BDF1-6B28-11ED-991C-C6F54D7498C3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0088055e35ffd801 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exepid process 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1040 iexplore.exe 1040 iexplore.exe 836 IEXPLORE.EXE 836 IEXPLORE.EXE 836 IEXPLORE.EXE 836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exeiexplore.exedescription pid process target process PID 532 wrote to memory of 1040 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe iexplore.exe PID 532 wrote to memory of 1040 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe iexplore.exe PID 532 wrote to memory of 1040 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe iexplore.exe PID 532 wrote to memory of 1040 532 c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe iexplore.exe PID 1040 wrote to memory of 836 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 836 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 836 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 836 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 836 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 836 1040 iexplore.exe IEXPLORE.EXE PID 1040 wrote to memory of 836 1040 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe"C:\Users\Admin\AppData\Local\Temp\c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://k.shuianshanba.com/c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720.exe/sohu.jpg2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD53b2b5d67d1a0d46e23dcf1119622c24c
SHA1ab439ac8c47f84407681b2c51a61dce8005ddcc4
SHA256c6c3700a3ad944843a35965f67e6f941584d28d0bde86f20c55b570f68d2a720
SHA512d758fc65b02f7eb504a83573a32054e735d99ef9461a904b590fbbee59cdf964d3aeb01b51a5bc662ebe9deed16d17a98a88e3d31d51b4610ef9dc3330e5c319
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8