Analysis
-
max time kernel
123s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe
Resource
win10v2004-20220812-en
General
-
Target
685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe
-
Size
143KB
-
MD5
cdc61cfc43b07bd213437e40f6732266
-
SHA1
da8b89159ee60cfaac9795f374effb3b9c1bb986
-
SHA256
685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e
-
SHA512
f251325188b38cdbbc1477504885f58f8b147577c72ddf51ed4807e18ab745904c6f84f449d057d3b2694b9c55b8e534fc638f225d4a5047e39a43513e0b06b4
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DU:pe9IB83ID5w
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b5ff4e8cf51c438a6ac1beb0ae4a1f000000000200000000001066000000010000200000009d24d5471b73619cb7be80174f354fd643d9eacc9ab90881c2297d7b143b5824000000000e8000000002000020000000ce9503c57e50cc779fcda9efe9983943ae6e95eabc325a9881860b4745b5ed159000000020b612a54266dfb59b061e12b82a325c752e07d4587c7c64e0ffdc92694c042473655d005d1f29c040d87fd29a780fb8256e6b585fb71f6a92a4637ce922b770e92434bb5a72166f9020b220c23f5bc087cd47a7d2a8ab34d926e4349a75bffd042436b30e0c4d2b70d69cc0015be0c2ac7cfb76612cb25d9fb8b569d95a75c201e09ce1e847bd7fae630ef6ed9ea3cb40000000caa931aef7ead2e054f0d1a8e9db08ea7d2215786211194246ef7243fa573f44d7dcb4e07ac2b9a98d0f2b232a82b5b2486a0323779ea193b9f6118e5f4beeb6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305ffeeebe02d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b5ff4e8cf51c438a6ac1beb0ae4a1f000000000200000000001066000000010000200000004718f609d5c653154e277e8c507fa987cb84a8545ff78511cacda67ced88dd2e000000000e8000000002000020000000a9606ec0e5a3bfe8969a1f5f0b8c18442c4e9194bf8f976dc6dbb57a41eeee1520000000e459f19c2890332a6b58ca6417a0274549740148036d0793f0a70752289461f240000000ba3474df51d680b3d1e8d793b4a58a421bb1061e8bf1cad581e54abfa4de604692d55ae5f0eb98731f259c81e35eac2f8d3329caf8fba3cd18ece2325ae7d171 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376359645" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17CB0301-6EB2-11ED-A50E-C6457FCBF3CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2016 685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe 1760 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2016 685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1412 2016 685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe 30 PID 2016 wrote to memory of 1412 2016 685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe 30 PID 2016 wrote to memory of 1412 2016 685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe 30 PID 2016 wrote to memory of 1412 2016 685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe 30 PID 1412 wrote to memory of 1760 1412 cmd.exe 32 PID 1412 wrote to memory of 1760 1412 cmd.exe 32 PID 1412 wrote to memory of 1760 1412 cmd.exe 32 PID 1412 wrote to memory of 1760 1412 cmd.exe 32 PID 1760 wrote to memory of 1688 1760 iexplore.exe 33 PID 1760 wrote to memory of 1688 1760 iexplore.exe 33 PID 1760 wrote to memory of 1688 1760 iexplore.exe 33 PID 1760 wrote to memory of 1688 1760 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe"C:\Users\Admin\AppData\Local\Temp\685f608a27837dffb2971d8b9ef0f20af31afb9bf1e4cd59dc4404094541bb7e.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=4300109^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt36^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=4300109&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt36|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5c31cf67132f37319f01b4f51e3fb8ab5
SHA187ad2e2f8e0be01c7b547187dc997dd63a5b1676
SHA2563e97acef8d4df4d98269bd171b614b08043e2d0ed6dad85c9adc6dce0e1ffce0
SHA5126b527175b8effbc6f35c0e453f8c3b7ffdfb97d3464dd23229d26f165636f73865e51aa1edf7d1c5cebab8e69f8b1a45d56741096428816294ccb45eea70a415
-
Filesize
597B
MD5ba39545495002fdb6210da7f2dd08041
SHA1160b20a705fcc35d88823b4689e9f2af4a601010
SHA256a558b85705778a8ba24a467133231ba38888fb69b50268b416f08d94390525ef
SHA5126a928066e7a654257001f010c652b67a8ebc139529f7f234a273476db8f047e2406e226d3d56ddfea172f27c71d00ae10af5e95c6adf64ec1a37c8295aecddd9