Analysis
-
max time kernel
93s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 06:20
Static task
static1
Behavioral task
behavioral1
Sample
4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe
Resource
win10v2004-20220812-en
General
-
Target
4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe
-
Size
196KB
-
MD5
58c3f3443578a9ca0fa14f53371d9f46
-
SHA1
c8caddf93116decb1cd940d850ad818aa5967948
-
SHA256
4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709
-
SHA512
eb1a6111ed4ca6d0bb80eac87f5fc46fcff52e26e836a35924bd589884991d622bc978eb993f4db09fa0ad286530cb56c30449a4dbb5e254de583932591a6c38
-
SSDEEP
3072:Cyjg+l/R3qGwlEUkNlJ9c4L5tMyktUOD:Cn+7aJleuy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10efe1d4d002d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EDDA8002-6EC3-11ED-AECB-C2DBB15B3A76} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ea4ad5d002d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999248" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999248" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999248" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c7a014671f9d74bb19de9a3e03cfb99000000000200000000001066000000010000200000008fde386baec58a653ac17bd0042ac17f423a050f3f2103453577418348a1b4ca000000000e80000000020000200000005e7dd17303922aa4d41d26633cc3310967a963d0d10bcfce791a9052fc3300062000000028c71d7b3c0f5d0ae8b70e36933d5fe7499caa82ac77e5765903b2c725e5de4c4000000054745410be9e42052c20984adfdd35eb948f680297a580d76b8aca9eab5b09d24d86d40079a79648ab675c6ca65cdc9b93a0fa6f7ef1d351230934201597898a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c7a014671f9d74bb19de9a3e03cfb99000000000200000000001066000000010000200000001d76ee5527188b08ee028a0a6ccbf4f5a0b9aed63e53b0debc9339d5728c5295000000000e80000000020000200000003d93058abccd7b14e5dde8467f9e9b8ea0c08120106c058e5af6210ca89c0cdf2000000095ad11f6d517c09f568f5bd81fd12f31d03169c2e9fbed5df8f6cb8fbc4504b4400000001cf36c930247aed532f8084d25d9b1e8f3c99cf98476f578affd6c0e60c0ccf46445bb6d469730def2882452eac39fa223fd7e11ff300e0d343457098140498a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3363148219" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3295175956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376367313" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3295175956" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1080 4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe 1080 4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1080 4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe 2676 iexplore.exe 2676 iexplore.exe 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2676 1080 4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe 79 PID 1080 wrote to memory of 2676 1080 4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe 79 PID 2676 wrote to memory of 4988 2676 iexplore.exe 80 PID 2676 wrote to memory of 4988 2676 iexplore.exe 80 PID 2676 wrote to memory of 4988 2676 iexplore.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe"C:\Users\Admin\AppData\Local\Temp\4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da30709.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" Error?4b5a3ce11aee9ece6abe9bea4aa2af9b92514ad16c252cf5ce5e4b902da307092⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53bc8595d0a469edc8b7a071a3befe724
SHA1f7e4b53b01d31626ab7965b267fea4457d798a91
SHA25633c4b30d18fa3eeeed676831973cf8dd8c9a9145e7edcb689efeec0647d685d4
SHA5124969ab6d2239a94d1dfb6105d9a329588ad0e3366ab4af874e033b853adfcadf808eced3466823136221e110accd2bcd5b25b0474b11947aab510f0b92d397d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5890d84eaab9434096aaeb88ba04c58a7
SHA1a5466078f40161cf35ed1f997aabdcff866cf05e
SHA2564ea3728a59acb0fdfd99fa417d16052f11ec8e96fdbed53d819e3b689d0dbe38
SHA512c7c3a6bb2d301c6c5911c6e46ff0479a15db3e427a3f193e69c6b7eb1f29004928e846a5ce463776efafdb6126f06bfe1c4b71099010d4704ea4a7f310433d56