Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:08
Static task
static1
Behavioral task
behavioral1
Sample
844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe
Resource
win10v2004-20220901-en
General
-
Target
844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe
-
Size
349KB
-
MD5
44af0d442e1941a625e63b15ad5861c5
-
SHA1
bbc6ae0ec4f4031a14f282839cbc3cf45d514e6a
-
SHA256
844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39
-
SHA512
d9f0251dbf0abce71f4dec2af55db3dabc16868f56bb680ed523e7e51b1e174f6ea77d59a1a01adf9c4b6ea88325569d0c367ba471f0e9a671d077f1697e63c4
-
SSDEEP
6144:ye34zV2nu/EJXAF8u1qBhGNy4909VezjiGF+nh9CUZLcb+FL79M:snEJXs1q2N1906jidGUZLcb+Fn9M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4120 installstat.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cscript.exe -
Loads dropped DLL 4 IoCs
pid Process 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 4120 installstat.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\EditPlus\kk47.icw 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1347986939" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fe335178ffd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998392" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000877dfe8205b8e3182894570d7b7e221563d903b788afc87f6db5573e402e126d000000000e8000000002000020000000664a9af35ffe9b2fc1584e525419ef1f74f23a48c3bc0f1b286d5b2ce28f0284200000000b4c95c24253ba30bf756f8912b5c575663bfbf735f0a54e92a83fb05b4a2aba40000000828c4a83a449cd6f6d4cdd2b0b4506ce5e75c803c08b069d10828f4284d55d89c33594e028f818d1898dfa3765061fa56d7549b9f493153af4853d6bf92203b0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f099635178ffd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375999464" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7B6E5876-6B6B-11ED-A0EE-CE8FEF2919E2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1342518123" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000b23e91fb43934e4d9790b652074d57e810d60e51b6598fd2d1d1fe7bee7ae6e0000000000e8000000002000020000000da4360f5af857991e0482e788ce1d571bc98a31d5680ce9db145ea78b7dbdf5720000000ac9e9f657c8e29f8200061575027a9e427526def1b374d3489b9ca368c9ecf8840000000639f51fb66de141fb39e5eb90fba08b9d6afe36d9484a5e11f5b53d72d40003b282b81d1a5c2e5e15bca894335586984554a6f4ab0b92a029a68d8c7e1327c54 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1342518123" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998392" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998392" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "icwfile" 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine\ = "VBScript" 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\ = "´ò¿ª(&O)" 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cscript.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 3296 IEXPLORE.EXE 3296 IEXPLORE.EXE 3296 IEXPLORE.EXE 3296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5040 wrote to memory of 3616 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 81 PID 5040 wrote to memory of 3616 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 81 PID 5040 wrote to memory of 3616 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 81 PID 3616 wrote to memory of 1504 3616 cscript.exe 83 PID 3616 wrote to memory of 1504 3616 cscript.exe 83 PID 3616 wrote to memory of 1504 3616 cscript.exe 83 PID 5040 wrote to memory of 4120 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 84 PID 5040 wrote to memory of 4120 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 84 PID 5040 wrote to memory of 4120 5040 844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe 84 PID 1444 wrote to memory of 3296 1444 iexplore.exe 87 PID 1444 wrote to memory of 3296 1444 iexplore.exe 87 PID 1444 wrote to memory of 3296 1444 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe"C:\Users\Admin\AppData\Local\Temp\844ef86fca242327e10270a4c64438ce458b757e78781d5cc9363a81350fbe39.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk47.icw"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk47.icw"3⤵PID:1504
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4120
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:520
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5a0045d3d1f4d4352c04206ea23f63abd
SHA12a9f9ba085ea46b8c85c9bd5f9268a3f7a534e0b
SHA25682eeffafe4647c24262512afac5e6c9748be5b2b13fb9135a86e5e636e71877b
SHA512df9270b5e2b957d8d2e0c2df9559ccc892f2ac02e3336d427fa82e36bce0e2cf2e63fba77317ecfec506fbcba334ca7ff3aed83586ed318b310f471f9452abd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5e32d02ce684c01ef3af05fae9066160e
SHA129c7a6e8ed553ac2765634265d1db041d6d422ec
SHA256b00322d178a6cfc206458c26b26d6c80596073bb3283dcc3fc4e33a4b5f29d71
SHA512e4e3175fb131095e4681ecb76d14dc74d059c0beafb6340965516c6d3d0538deb314b36a3f09df03b491edac84d5c0580e764fed1d8bca9abd4e65cb56167148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5841565851672b1bfdb66eb73154df0a3
SHA1e8d4bb9069981276b292be3a2de4bfcdb152630c
SHA2562b7aed43f599cb3c0e5b65e678a04f50f6057af6592cb671cf3a89898b871058
SHA5125239c4c66df44bfe77200e7a7c5c60f043efcfdbe0963c876a314ac17d225bbcc8606467445eea48f12fcf4679dda70eedd97de020bf0f4ef44fb60874241a5c
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
843B
MD5f23b2e81fe44439b81be01204f0eb40a
SHA1628483c315620b99a7d5ae424554ad5ca1db46dc
SHA25695e66434aabdf25e8a4a2934c7a4497af12ca0962b2277aa20b7b6c01d605052
SHA5120955f4400fc7883d8bd593f74508043e644b3ca7506f73984aa4dbf3ad0948c31f5b66599cc788dc5694c70e4d30e0eea34f0370b5b0126910f7d4d70c9b2096
-
Filesize
80KB
MD5271d838f235c3d77964909b79e05cc3d
SHA1e88316549fcbe9c4b4cec8001b63f439884974b9
SHA2561919f130b200be8591051f325137fe0a976295c73f325853ca8167c7da53717e
SHA5121a361ad7c4d9fe217a4fe9ae3056c09a2769941a1377cb91c414453c7cc0d54bc729fae3648c3369d619e86a2c2a2143894726fba657821dca482b8bf7a75419
-
Filesize
80KB
MD5271d838f235c3d77964909b79e05cc3d
SHA1e88316549fcbe9c4b4cec8001b63f439884974b9
SHA2561919f130b200be8591051f325137fe0a976295c73f325853ca8167c7da53717e
SHA5121a361ad7c4d9fe217a4fe9ae3056c09a2769941a1377cb91c414453c7cc0d54bc729fae3648c3369d619e86a2c2a2143894726fba657821dca482b8bf7a75419