Analysis
-
max time kernel
61s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe
Resource
win10v2004-20221111-en
General
-
Target
6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe
-
Size
788KB
-
MD5
74a29fafabc5afc85c52ad52b70b67f8
-
SHA1
4c71c55cfc2cf48f185a300df33889ab6d195fc7
-
SHA256
6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5
-
SHA512
7dbb0d4abb2538ae2eb8c47ffd65503f1cf26bb2a88c627be4e40de86d8d8faf795a1e445bc31fa1a4c3f84a8776b8f7de9356b098f6f2c8b754dd2abff1320b
-
SSDEEP
24576:JBs6ZFH2p+hY3SJKZUSh8wV1EzoVI5PZm42eBY5/RTl:JC6IvPZUSh8wV1EzoVOZm42Z5/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1324 Setup.exe -
Loads dropped DLL 1 IoCs
pid Process 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 768 wrote to memory of 1324 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe 28 PID 768 wrote to memory of 1324 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe 28 PID 768 wrote to memory of 1324 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe 28 PID 768 wrote to memory of 1324 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe 28 PID 768 wrote to memory of 1324 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe 28 PID 768 wrote to memory of 1324 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe 28 PID 768 wrote to memory of 1324 768 6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe"C:\Users\Admin\AppData\Local\Temp\6df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\a2KhSszn11\q0qUz8CC\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2KhSszn11\q0qUz8CC\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:1324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
788KB
MD574a29fafabc5afc85c52ad52b70b67f8
SHA14c71c55cfc2cf48f185a300df33889ab6d195fc7
SHA2566df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5
SHA5127dbb0d4abb2538ae2eb8c47ffd65503f1cf26bb2a88c627be4e40de86d8d8faf795a1e445bc31fa1a4c3f84a8776b8f7de9356b098f6f2c8b754dd2abff1320b
-
Filesize
788KB
MD574a29fafabc5afc85c52ad52b70b67f8
SHA14c71c55cfc2cf48f185a300df33889ab6d195fc7
SHA2566df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5
SHA5127dbb0d4abb2538ae2eb8c47ffd65503f1cf26bb2a88c627be4e40de86d8d8faf795a1e445bc31fa1a4c3f84a8776b8f7de9356b098f6f2c8b754dd2abff1320b
-
Filesize
788KB
MD574a29fafabc5afc85c52ad52b70b67f8
SHA14c71c55cfc2cf48f185a300df33889ab6d195fc7
SHA2566df3b21cc55c36388266f7aa8611b449dffb0450dbdedb2fef4389f2a8f84fb5
SHA5127dbb0d4abb2538ae2eb8c47ffd65503f1cf26bb2a88c627be4e40de86d8d8faf795a1e445bc31fa1a4c3f84a8776b8f7de9356b098f6f2c8b754dd2abff1320b