Analysis
-
max time kernel
164s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe
Resource
win10v2004-20220812-en
General
-
Target
8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe
-
Size
1.7MB
-
MD5
7528fdd1b057cf66efd96bce95224bc0
-
SHA1
0163c3c0d487eefbcd89d3498fc1e7f03b3fec17
-
SHA256
8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572
-
SHA512
8d34ba00be0b78be74956e1fd1269fe2e55421c74c65845a7c550cce9411464364a0815e002dc3defc3f23c2e994ef5e69654cb90f59f45b8e766a2d39eac2b2
-
SSDEEP
24576:B9aVH768bvqKXo310XqTER8OCYbxPTQi688MT2vTaogMcN3r:rax768bvqB31iRlLNTOaoxcN3r
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\PastD9LMJ.sys 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\341wg.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\gxfcfssq1617.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.341wg.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000644949a94de4b45ab3e75809e1cc006000000000200000000001066000000010000200000000c5050a459565f6a462a65693f3bc1ff5ce5f8ca27428791ef844aa4ac878802000000000e8000000002000020000000aecada931cc3f9de444834785f4ac83c01795aa5d0e63cb0d46bacecff5a710c9000000037a825207585db1420ca20a88aa4dd4d50634d7b8e7f5e9cc3afedfea4b33f84114d45033d83c26fbfc763c794715f5ddffa616ff03fb47c1b16cbe816fcde11e71cdcab50caf57d326ca95ccdfb8679e4624fc71a8e42333a32bf14cbe06d72eb01dc83f801b963a6702a3776ac8d41e5686839226ffd666138b30156f17384fc8c95ffd25623e6fe93741d16cc2ece400000008b84304466630c15ff4ff235f888e5f38c082c52deee04929320270d1926c45863d8c2f1c7c5b58bfa3799399a8dc2df7b32b619ad55f74ee2705acaef8b1c12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DBFC4D1-6D4D-11ED-808D-42A98B637845} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000644949a94de4b45ab3e75809e1cc00600000000020000000000106600000001000020000000a6ae5b36072f62495ec4e26b70f2081c98a7df76c8f2418f9bd5aca678ec3dda000000000e8000000002000020000000c8a2397eecb8b04490b2ffe1b20c578e67570f45b3f323b35ef41f01c848905020000000f4e83ed14023c76c2807da39d7ccb88ffce9019be112a181705f8044d5e0751e40000000fed9a6e115bf505272b3d6fc190cec022d47509fc76d2d27c19479b60dbba0e03747082362907984a8936f2a6a1dc909317219dd49f1fbba38562be573ac3c40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e5a3755a01d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\341wg.com\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\gxfcfssq1617.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\341wg.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.341wg.com\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376206513" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.gxfcfssq1617.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\gxfcfssq1617.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.gxfcfssq1617.com\ = "63" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kcffeige" 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 460 Process not Found 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 804 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 804 iexplore.exe 804 iexplore.exe 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1324 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 13 PID 1972 wrote to memory of 804 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 29 PID 1972 wrote to memory of 804 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 29 PID 1972 wrote to memory of 804 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 29 PID 1972 wrote to memory of 804 1972 8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe 29 PID 804 wrote to memory of 1900 804 iexplore.exe 30 PID 804 wrote to memory of 1900 804 iexplore.exe 30 PID 804 wrote to memory of 1900 804 iexplore.exe 30 PID 804 wrote to memory of 1900 804 iexplore.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe"C:\Users\Admin\AppData\Local\Temp\8add444fef813fdc14f7f84d96eedf744d27af483d1a4e5cbae8f2e70b9a2572.exe"2⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.341wg.com3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:804 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d683a5fed1ea0a520a2613786ac6d636
SHA18e39bf37dfd89bd981f3fec7589e7eb423679a79
SHA256ac46d047739d1b4d5bc78d7bfa2cc3426e8dd49b487602146ae94fc3a2f60744
SHA512a328fe61ec02f7f4ab02ab5ebb38d4f69fcca40a08b1373f673a1f4ae651c6e89e2165a3287df5a7ef77e3c94b044642676d9a9800a0bcbbbd1c64f0167d2567
-
Filesize
5KB
MD554251dd079744c2050fcf52fa4eea8cc
SHA1c7dd881145bf21f88bbb96807cd8a93d60645f1d
SHA256a855587c3ca081719275f6de2919c5877eadf29346dc59640e760e8ed3faf4ab
SHA512aaa5fd694c3a81123a90975ec8b3bdcf83d4e3bb563a6e89be8f73e0ed7750f4d26991f4c0f26b8b4a7efcd31f3d11ab8db097feee0e8feb1227f3e1ace7cefb
-
Filesize
608B
MD5d89c6a66bc0ae22bfaed89d2098d800d
SHA14c6fdf638b6d451d0ea1de73e4d296bb4887ccae
SHA2567f6fa04387840868df95b16635b78c1cea7c29d60657de9b5eb7dc2bb6c07dcf
SHA51201ffc0778a8f833eb8f05e10f940fd4e438139e32c11154fc2fead7022fdf14a7db5bf05cf3ff96b0972fa625dc8522d0172dc2dc2a74f3fb3405d0e95831358