Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:08
Static task
static1
Behavioral task
behavioral1
Sample
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe
Resource
win10v2004-20221111-en
General
-
Target
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe
-
Size
2.8MB
-
MD5
a2c9ee7419369ada4d8a41ef14d642a4
-
SHA1
bbeee886e192b807097c22bbaf79483659242d11
-
SHA256
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633
-
SHA512
0f14717a83583b92ec472c7557cd1d81a95bc66507089aa0cfc785e575a11406aae172f3c95dec61426cbe6848f8a4e4a3e99b9183f351c6bbd5379657a337e1
-
SSDEEP
49152:etQ81S566MD++BLuh7BFQEuQsk9RxsmHpAJr/EnPUk151Fy7b3mAn0JxRvyGoU+T:etQ81ZpD++Buh7L/rxxHpAJCNZYH26x3
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe -
Executes dropped EXE 1 IoCs
Processes:
update.exepid process 456 update.exe -
Processes:
resource yara_rule behavioral1/memory/2032-58-0x0000000002730000-0x00000000027A2000-memory.dmp upx behavioral1/memory/2032-60-0x0000000002BF0000-0x0000000002C62000-memory.dmp upx behavioral1/memory/2032-62-0x0000000002BF0000-0x0000000002C62000-memory.dmp upx -
Loads dropped DLL 6 IoCs
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exeupdate.exepid process 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 456 update.exe 456 update.exe 456 update.exe 456 update.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exeupdate.exepid process 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 456 update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?k7719958" bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?k7719958" bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?k7719958" bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exeupdate.exepid process 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 456 update.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exeupdate.exepid process 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 456 update.exe 456 update.exe 456 update.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exedescription pid process target process PID 2032 wrote to memory of 456 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe update.exe PID 2032 wrote to memory of 456 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe update.exe PID 2032 wrote to memory of 456 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe update.exe PID 2032 wrote to memory of 456 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe update.exe PID 2032 wrote to memory of 456 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe update.exe PID 2032 wrote to memory of 456 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe update.exe PID 2032 wrote to memory of 456 2032 bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe"C:\Users\Admin\AppData\Local\Temp\bbc4ba600bec97977bd31eb7e1e197c22eeb29266c37f536e6a40e3d4a1ac633.exe"1⤵
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\update.exeupdate.exe ¡. ,37B74A5D6,¡¾·þÎñ¶ËÔÝʱ²»¿ÉÓá¿404 ,727273247271262020727573292729272772742321757227752175212927732222757572222922262673232776252326752671242075237424712171732623233E75687537B74A5D62⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD51dd2a4a0f4d21eb65db5895fca2ca489
SHA1b0c0617f6f66b35e255ec9824cde41f382a60e80
SHA2567a7f037bab8024a9d17fb225cc4aa04133081135ecc4be5bbb889c0fbebd7e0c
SHA512214e7aa56e820ebec87a778293871672f7c4e92d06bdf5ba18a2fc536003b2e15ebdce65c1ae3c927a16fcfe865c1720a7262e7a700459c66b4ae563374518ae
-
Filesize
17KB
MD580c06edd13c6f84f046f9058ca457920
SHA1a577a558a594318e4dcfecfc78e20fa59a2a6bee
SHA2562bd8a27de57e5aab144d10d2dc5413f0b09141e93aae0387ade268d86ebbc7b2
SHA5129b981ec499e8e6e8a4fa6e964d5109a93c6177a8db4cf3e7df62254cb916f97fc2c32f51bfe7ced92b4d7ab2a42bbbae2a49e71f7e13cd6833b975438f579459
-
Filesize
1.1MB
MD5554d2c9234f97f2514e58da55e12d505
SHA13bda8c0ec3339a44f5420cf43b827a18242db9f1
SHA2567b7651ef58f67458b0f924191822cbcaff15d14a60f9a1fac83f474f550adeff
SHA5125668cc0073a015fa87d6fb5cdb1dc6aee36df3c9202d93817b1a3fbd8aec5e94c8f3bf0c240bc6b4cd8b73c4bbbdd7f5748ba2f508fdc709a0350d4eac630d5d
-
Filesize
1.1MB
MD5554d2c9234f97f2514e58da55e12d505
SHA13bda8c0ec3339a44f5420cf43b827a18242db9f1
SHA2567b7651ef58f67458b0f924191822cbcaff15d14a60f9a1fac83f474f550adeff
SHA5125668cc0073a015fa87d6fb5cdb1dc6aee36df3c9202d93817b1a3fbd8aec5e94c8f3bf0c240bc6b4cd8b73c4bbbdd7f5748ba2f508fdc709a0350d4eac630d5d
-
Filesize
98KB
MD51dd2a4a0f4d21eb65db5895fca2ca489
SHA1b0c0617f6f66b35e255ec9824cde41f382a60e80
SHA2567a7f037bab8024a9d17fb225cc4aa04133081135ecc4be5bbb889c0fbebd7e0c
SHA512214e7aa56e820ebec87a778293871672f7c4e92d06bdf5ba18a2fc536003b2e15ebdce65c1ae3c927a16fcfe865c1720a7262e7a700459c66b4ae563374518ae
-
Filesize
98KB
MD51dd2a4a0f4d21eb65db5895fca2ca489
SHA1b0c0617f6f66b35e255ec9824cde41f382a60e80
SHA2567a7f037bab8024a9d17fb225cc4aa04133081135ecc4be5bbb889c0fbebd7e0c
SHA512214e7aa56e820ebec87a778293871672f7c4e92d06bdf5ba18a2fc536003b2e15ebdce65c1ae3c927a16fcfe865c1720a7262e7a700459c66b4ae563374518ae
-
Filesize
1.1MB
MD5554d2c9234f97f2514e58da55e12d505
SHA13bda8c0ec3339a44f5420cf43b827a18242db9f1
SHA2567b7651ef58f67458b0f924191822cbcaff15d14a60f9a1fac83f474f550adeff
SHA5125668cc0073a015fa87d6fb5cdb1dc6aee36df3c9202d93817b1a3fbd8aec5e94c8f3bf0c240bc6b4cd8b73c4bbbdd7f5748ba2f508fdc709a0350d4eac630d5d
-
Filesize
1.1MB
MD5554d2c9234f97f2514e58da55e12d505
SHA13bda8c0ec3339a44f5420cf43b827a18242db9f1
SHA2567b7651ef58f67458b0f924191822cbcaff15d14a60f9a1fac83f474f550adeff
SHA5125668cc0073a015fa87d6fb5cdb1dc6aee36df3c9202d93817b1a3fbd8aec5e94c8f3bf0c240bc6b4cd8b73c4bbbdd7f5748ba2f508fdc709a0350d4eac630d5d
-
Filesize
1.1MB
MD5554d2c9234f97f2514e58da55e12d505
SHA13bda8c0ec3339a44f5420cf43b827a18242db9f1
SHA2567b7651ef58f67458b0f924191822cbcaff15d14a60f9a1fac83f474f550adeff
SHA5125668cc0073a015fa87d6fb5cdb1dc6aee36df3c9202d93817b1a3fbd8aec5e94c8f3bf0c240bc6b4cd8b73c4bbbdd7f5748ba2f508fdc709a0350d4eac630d5d
-
Filesize
1.1MB
MD5554d2c9234f97f2514e58da55e12d505
SHA13bda8c0ec3339a44f5420cf43b827a18242db9f1
SHA2567b7651ef58f67458b0f924191822cbcaff15d14a60f9a1fac83f474f550adeff
SHA5125668cc0073a015fa87d6fb5cdb1dc6aee36df3c9202d93817b1a3fbd8aec5e94c8f3bf0c240bc6b4cd8b73c4bbbdd7f5748ba2f508fdc709a0350d4eac630d5d