Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:29
Static task
static1
Behavioral task
behavioral1
Sample
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe
Resource
win10v2004-20221111-en
General
-
Target
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe
-
Size
7.5MB
-
MD5
6fc3d6f074bc1a6da2823073f0b60a6f
-
SHA1
ac0f90f41a33bef8410f8ad4972479f18208bd4b
-
SHA256
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c
-
SHA512
d584551bacc6516a3840affd5cd20d35aae76e94f96800843e9f58912760f6be63e636a776d081a3e565e45bb6a0aa8b621f01c342a7f275ec7eed22c4a5f6b8
-
SSDEEP
196608:EhmuzObO7+B376sS4KwPjvnLx/iw2H7tHs1RvX5X+:EsB32sS4KgjjY721jO
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll acprotect -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SkinH_EL.dll upx behavioral1/memory/2000-4820-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 564 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exepid process 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
Processes:
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exepid process 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0419a8a63ffd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B233DC01-6B56-11ED-BF27-66397CAA4A34} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000771bd71d00133a4ab65d13d5ad0b2e3500000000020000000000106600000001000020000000df66d99f814e00d898e09df1cbf1fcd32005724b19a4a5b4b109cdf2d4f1b064000000000e8000000002000020000000143728438d12e0fa0bd3a59e300dab5fd3691da27c263fa13f818df090a56aba200000006014706be83dfd7796a65a8678eee5c3b17556bef2ad65687472227a98e546ca400000006bc63be6cb07723eff11cc93a718be58afe6210832d9d4a41c265b3864061306f91674763f13979e1c9f33a7ffc28a883fbade17321e2421d100a55ee114931f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375990537" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 900 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exeiexplore.exeIEXPLORE.EXEpid process 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe 900 iexplore.exe 900 iexplore.exe 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exeiexplore.exedescription pid process target process PID 2000 wrote to memory of 900 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe iexplore.exe PID 2000 wrote to memory of 900 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe iexplore.exe PID 2000 wrote to memory of 900 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe iexplore.exe PID 2000 wrote to memory of 900 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe iexplore.exe PID 900 wrote to memory of 1160 900 iexplore.exe IEXPLORE.EXE PID 900 wrote to memory of 1160 900 iexplore.exe IEXPLORE.EXE PID 900 wrote to memory of 1160 900 iexplore.exe IEXPLORE.EXE PID 900 wrote to memory of 1160 900 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 564 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe cmd.exe PID 2000 wrote to memory of 564 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe cmd.exe PID 2000 wrote to memory of 564 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe cmd.exe PID 2000 wrote to memory of 564 2000 e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe"C:\Users\Admin\AppData\Local\Temp\e8697fbe9c1955e081bfd9c9760b8d8453c8619a706a0a716bcfec1673689b9c.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://182.92.100.77/pz.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1160 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\/1.bat2⤵
- Deletes itself
PID:564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305B
MD5d70c67aac1d5edc9cca82d434ed284a4
SHA11a92f6b2df7c73c77f0fb2cc12b4716ee2c5d90d
SHA25619980937e33f93a0b26bf9db082a9fc000fe0e7a1303d1cf3267049aea2f2b95
SHA512b44b28609191acee3b78f8b902ff58e7832131e6f7461f44d357c9928a19b6b69b8a12cdbf275f834cb1002d30242849eb3ce60316ad46bbd2cbae7d4d2f001c
-
Filesize
608B
MD5af04e6fecebe5a1dc5fe8c16001185d4
SHA15efe12221dfbfc0469c361cb1af76c09f8ca1ecf
SHA25660b0db7eb769efa21babd0849360be092cf457dce5751b9cb91b92f3520244e6
SHA5127892cef1146045117289c391fea659c4e916eeebf656a668f0a622cde948cf818e29713f8d11830debfa3611462688a10e5f68c27a6add73bfc1ea56a9360c25
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d