Analysis
-
max time kernel
172s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe
Resource
win10v2004-20220812-en
General
-
Target
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe
-
Size
1.8MB
-
MD5
bc12b2e7deab49ab4c7e56a538287f9b
-
SHA1
20db61918dd5d3dd72c242da4dfeb95e26fdaef3
-
SHA256
cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f
-
SHA512
c9c5ffa8322cd6d45aa2a6a00f1a1f0c9f187765de7c928af454a56f68c93891f18e5e9f0fb5a8414add26d1fbe4e88a12f1ea9f84888251c2c13212b5b06a83
-
SSDEEP
49152:/iZ2ei3daoP9ugXMbzwAKmEjrMHp/916LqV+r:/i2ei3djPLM3wAKRrMJl0Br
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe -
resource yara_rule behavioral1/memory/1724-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-102-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-104-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-106-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-108-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1724-109-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039c34da08c05b14ba522630d3facbcec000000000200000000001066000000010000200000001e32de589bb738b212e55d3df8146d601b6076e4b75f70bde55aa3bbb7192180000000000e8000000002000020000000aa52e41cf37c83914354cb07ecad78fe6624d63b673b2d02d002382b5acb3dcc200000001a36f86c25363f6e59ad67fc1e591e2d8befb290f1c32da94cec46456613b78140000000f6db1ff54c87a39c34a129dc681f0a27c75681fa9d82c3a01ed7bc5e43920964c14872e335db237c12bbcf70511f32232c7e75d758c5e83640bbc3772d4212a5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104ba3911101d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA216951-6D04-11ED-9F1A-42A98B637845} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe Token: SeIncBasePriorityPrivilege 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 924 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 924 iexplore.exe 924 iexplore.exe 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1724 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 28 PID 1472 wrote to memory of 1724 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 28 PID 1472 wrote to memory of 1724 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 28 PID 1472 wrote to memory of 1724 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 28 PID 1472 wrote to memory of 1724 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 28 PID 1472 wrote to memory of 1724 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 28 PID 1472 wrote to memory of 1724 1472 cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe 28 PID 1724 wrote to memory of 924 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 31 PID 1724 wrote to memory of 924 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 31 PID 1724 wrote to memory of 924 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 31 PID 1724 wrote to memory of 924 1724 СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe 31 PID 924 wrote to memory of 1328 924 iexplore.exe 32 PID 924 wrote to memory of 1328 924 iexplore.exe 32 PID 924 wrote to memory of 1328 924 iexplore.exe 32 PID 924 wrote to memory of 1328 924 iexplore.exe 32 PID 924 wrote to memory of 1328 924 iexplore.exe 32 PID 924 wrote to memory of 1328 924 iexplore.exe 32 PID 924 wrote to memory of 1328 924 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe"C:\Users\Admin\AppData\Local\Temp\cb08ddb320c9b9a628a62e614f35f0a67899078c38bb991449e8347e89e9cb3f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe"C:\Users\Admin\AppData\Local\Temp\СÍûÎ÷ÓδóÕ½½©Ê¬2ÐÞ¸ÄÆ÷V1.4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xydz.110zm.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:924 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b
-
Filesize
6KB
MD5a1bba35c752b36f575350cb7ddf238e4
SHA19603b691ae71d4fbc7a14dbb837bd97cecac8aab
SHA2560667863d71a3021ab844069b6dd0485f874bf638af478ab11c6fb8b7d6c834b6
SHA512eb5d3498dd994bec42a437cf91343665d3c35bfe3f6277a7393af6a0b8348772c3166d9be48955edddf6ef79fa508ec8d4f96d7d5df37ecdc52c90042e0a2967
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b
-
Filesize
2.4MB
MD560eadc798c1e8bf93ebd8e69a2218c06
SHA1a68b12e94c7dd9b2869c06f985a6ec2e14d3ea9b
SHA2563ea7cc6387bd7fe1edd57a32f62cee107e85373fe0a1f447e8927d290cf95a07
SHA5124583e1f82a63ed49c98a210d3c2887484a01b72d168e468fddc24b6b3438e533799a415785f16e2d3ae179643496a98c6ff531a2a79298d3e0bbb8ea16d0a87b