Analysis
-
max time kernel
188s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 10:09
Static task
static1
Behavioral task
behavioral1
Sample
27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe
Resource
win7-20220901-en
General
-
Target
27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe
-
Size
244KB
-
MD5
17c90fb4c2d6c8503a52212d68740319
-
SHA1
fe8483c33b14ca013da36afdc1278ac220b8bd3d
-
SHA256
27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63
-
SHA512
c978c6303a89125723aeb2cadcbeb945ed1f7341bb956f231f6c3104c02f4aa68a61041a59ee800edcea1623bf8b76bd6e84f6e987749462ab43ef0cc07af74a
-
SSDEEP
6144:1ND+xKDtDAr6GBzeS5bzQiOTn+fD3sUGMBjMu:KxCDAm0eS5bzQiOTn+fD39Bj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24112022.exe -
Executes dropped EXE 1 IoCs
pid Process 3968 24112022.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 24112022.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24112022.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 24112022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\NoExplorer = "1" 24112022.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998551" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3189970501" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998551" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3190126013" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E256DDA2-6C0A-11ED-919F-FE1968EF3A40} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 668 27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe 3968 24112022.exe 1984 iexplore.exe 1984 iexplore.exe 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 668 wrote to memory of 3968 668 27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe 83 PID 668 wrote to memory of 3968 668 27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe 83 PID 668 wrote to memory of 3968 668 27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe 83 PID 3968 wrote to memory of 3276 3968 24112022.exe 84 PID 3968 wrote to memory of 3276 3968 24112022.exe 84 PID 3968 wrote to memory of 3276 3968 24112022.exe 84 PID 3968 wrote to memory of 2860 3968 24112022.exe 85 PID 3968 wrote to memory of 2860 3968 24112022.exe 85 PID 3968 wrote to memory of 2860 3968 24112022.exe 85 PID 3968 wrote to memory of 1984 3968 24112022.exe 86 PID 3968 wrote to memory of 1984 3968 24112022.exe 86 PID 1984 wrote to memory of 4988 1984 iexplore.exe 87 PID 1984 wrote to memory of 4988 1984 iexplore.exe 87 PID 1984 wrote to memory of 4988 1984 iexplore.exe 87 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 24112022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24112022.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 24112022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ = "1" 24112022.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe"C:\Users\Admin\AppData\Local\Temp\27412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\24112022.exe"C:\Users\Admin\24112022.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
- Installs/modifies Browser Helper Object
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3968 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s c:\Users\Admin\cckwfsmm\cckwfsmm.dll3⤵PID:3276
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s c:\Users\Admin\cckwfsmm\cckwfsmm.dll3⤵PID:2860
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD517c90fb4c2d6c8503a52212d68740319
SHA1fe8483c33b14ca013da36afdc1278ac220b8bd3d
SHA25627412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63
SHA512c978c6303a89125723aeb2cadcbeb945ed1f7341bb956f231f6c3104c02f4aa68a61041a59ee800edcea1623bf8b76bd6e84f6e987749462ab43ef0cc07af74a
-
Filesize
244KB
MD517c90fb4c2d6c8503a52212d68740319
SHA1fe8483c33b14ca013da36afdc1278ac220b8bd3d
SHA25627412da38fde9ef39250693ad281dbb222b83a032322460fe3f0144ee80b0d63
SHA512c978c6303a89125723aeb2cadcbeb945ed1f7341bb956f231f6c3104c02f4aa68a61041a59ee800edcea1623bf8b76bd6e84f6e987749462ab43ef0cc07af74a
-
Filesize
106B
MD5674e88b726353f6a2cabd4359176f65b
SHA1c1d09063837b46390120b6a7d55697f695dfa6da
SHA2568677e683e8bffb8a65cede2fcd0977a377d3640aa5a140a1e2b12c79afa15e1a
SHA5120735a0123d03b18869ba3f9901c0baf913504687cd79911760c86e2b504ad79707796a6f62c26c4ca8c371c755b8dd1513e954908a580b6d972699513f1e9221