Analysis
-
max time kernel
37s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 22:00
Behavioral task
behavioral1
Sample
explorer.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
explorer.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
explorer.exe.intermediate.xml
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
explorer.exe.intermediate.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
nfzn.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
nfzn.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
nfzn.dll.intermediate.xml
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
nfzn.dll.intermediate.xml
Resource
win10v2004-20221111-en
General
-
Target
explorer.exe
-
Size
359KB
-
MD5
771b83237080ce84f277b99fc57363e7
-
SHA1
098b95bf5605af681a1a2e71919c64c86baf4a0b
-
SHA256
66478e56cae82555807d363e872e8aef552daedbbf2e16238e96e54e950e2e70
-
SHA512
e66fa464d13088534d9bbaf0748f37708fbf21ec8792fd3c04b2c780ef0257bacbc094552a1af45d5d2880c7f2cd540f6f19176026187254f5d22ec552e2ad1f
-
SSDEEP
6144:4KIV0ybHaU2lWrt4+gn849gq22v7OMSII+23T1rng22yCsGd90Zgy:0HpYael922v7OnxTlngTnd98p
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1232-55-0x0000000041700000-0x00000000417A6000-memory.dmp vmprotect behavioral1/memory/1232-57-0x0000000041700000-0x00000000417A6000-memory.dmp vmprotect behavioral1/memory/1232-58-0x0000000041700000-0x00000000417A6000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
explorer.exepid process 1232 explorer.exe 1232 explorer.exe 1232 explorer.exe 1232 explorer.exe 1232 explorer.exe 1232 explorer.exe