Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 11:47
Static task
static1
Behavioral task
behavioral1
Sample
cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe
Resource
win7-20221111-en
General
-
Target
cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe
-
Size
206KB
-
MD5
b7cd63d1002cb1555565da0b41f1642d
-
SHA1
764558f3bfd0d4783fca8edabf5fbc605585d612
-
SHA256
cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5
-
SHA512
457b4a0d084af80c45623db7921b5ee37984090d18b4f1174d7c7b7842c111dd142e2b57c8aec7a8c341c27be7e33233e68bc69674099d23244f85b129ac8c97
-
SSDEEP
3072:6OFIJ3oVdYUiK7+YoPgWVJooHAUo+V2KP9JMjew9gt3qf:6cIhoXH+MWDoLmLVJIr9o
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4768 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe 4324 DesktopLayer.exe -
resource yara_rule behavioral2/files/0x0003000000000721-133.dat upx behavioral2/files/0x0003000000000721-134.dat upx behavioral2/files/0x0004000000000727-136.dat upx behavioral2/memory/4768-138-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4324-140-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x0004000000000727-137.dat upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxF3AC.tmp cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998778" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998778" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3887952609" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376165506" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1302D646-6CEE-11ED-A0EE-4A7057C3C021} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3896859490" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3887952609" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998778" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4324 DesktopLayer.exe 4324 DesktopLayer.exe 4324 DesktopLayer.exe 4324 DesktopLayer.exe 4324 DesktopLayer.exe 4324 DesktopLayer.exe 4324 DesktopLayer.exe 4324 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4908 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 4908 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4768 4908 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe 83 PID 4908 wrote to memory of 4768 4908 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe 83 PID 4908 wrote to memory of 4768 4908 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe 83 PID 4768 wrote to memory of 4324 4768 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe 84 PID 4768 wrote to memory of 4324 4768 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe 84 PID 4768 wrote to memory of 4324 4768 cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe 84 PID 4324 wrote to memory of 840 4324 DesktopLayer.exe 85 PID 4324 wrote to memory of 840 4324 DesktopLayer.exe 85 PID 840 wrote to memory of 2264 840 iexplore.exe 86 PID 840 wrote to memory of 2264 840 iexplore.exe 86 PID 840 wrote to memory of 2264 840 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe"C:\Users\Admin\AppData\Local\Temp\cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exeC:\Users\Admin\AppData\Local\Temp\cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a42abb21be3940a88a73771b18ed0f35
SHA1de12f2f619852ef135ee726614c43c2033ec5743
SHA256edaf1fb1f6ca2a0caf5f4d85b3f13507bd5df4971fa9ea8a6e08c1227f1ec667
SHA512c1f775deb2bcb2e0c48ed74dec1cd95f34690ca16d6465175d52d60ae45e746201cc608a58b6f8f080b7e6a7893993b61093c7d9ff63fa735ebaba61ddd0ebf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD50982d7316d222a8ee96451975d890d20
SHA1c2018200fa38bd4a35db90af74d8ed4f24524671
SHA256e4a2fea2ec64e4b25c8944ca1dd3669ced089e44a28372c5980726f7f43da5ed
SHA51213505b0753c3fbd44d7138b226cdfcfb645b2218a1c845ed93826a34022cb039bb77751be722f1fba5357ab609c7455e81c2909a04a0e8b5b92891308a7a18c7
-
C:\Users\Admin\AppData\Local\Temp\cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\cfe5349322f19a82ab07266990abb610c596a7fda1b127a2b13fede5e4d208f5Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a