Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 07:48
Static task
static1
Behavioral task
behavioral1
Sample
6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe
Resource
win7-20220812-en
General
-
Target
6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe
-
Size
2.0MB
-
MD5
1ef927006683a9187cc55c8efe36e256
-
SHA1
bccb3687d7ce6caa1c8c6d1ee21e99aca9acf21c
-
SHA256
6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b
-
SHA512
0d76cf765eaeaef62f104fc9c6b2d9bb2a401c39e72df7fb2199b2348b5b3f482725f098125b6d443f0dcccef2aa495126a5b1e025be0df1b9b52ceec67d87b4
-
SSDEEP
24576:uBoJKz7+Ze0/r2PEw55c2wTYs42cYbDyGWBVGZu8BlscURb+bo98Ef1gFIo4KGqI:upz7G2PxJhAyGWv4uAA+cRgFIAG2SWs
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/864-55-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-56-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-57-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-59-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-61-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-63-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-67-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-65-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-69-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-71-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-75-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-73-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-79-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-83-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-85-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-81-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-89-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-91-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-93-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-95-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-87-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-97-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-77-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/864-98-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Processes:
resource yara_rule \Windows\SysWOW64\SuperEC_Hook.dll vmprotect C:\Windows\SysWOW64\SuperEC_Hook.dll vmprotect behavioral1/memory/1264-104-0x0000000016080000-0x0000000016152000-memory.dmp vmprotect -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1264 regsvr32.exe -
Drops file in System32 directory 1 IoCs
Processes:
6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exedescription ioc process File created C:\Windows\SysWOW64\SuperEC_Hook.dll 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exe6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048570d7303dcc14cb9585ea960ae4dff00000000020000000000106600000001000020000000393a74472afb32abbe47ae8aba8c32ed97a8a0a140f4e1152afb215c7b8f51d5000000000e80000000020000200000002e48043f54656b00160474739f73f3ff583086665f8650e08ec97ce3b32ce11d20000000e9ae6d4183f1b291722792161d9afed04000ac76dd2b841c33eac5810d431f2540000000384962b34961023bf15b6effd976ee0923c118aae552dbf7dd6efcbdb382aec691676fe1948548a4a7ecf31853c82c308c639932ab8063f6ad87f630a20d7a1b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376374351" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05d032ee102d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54F415B1-6ED4-11ED-BF3D-D6AAFEFD221A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 832 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 832 AUDIODG.EXE Token: 33 832 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 832 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exeiexplore.exeIEXPLORE.EXEpid process 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe 1928 iexplore.exe 1928 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exeiexplore.exedescription pid process target process PID 864 wrote to memory of 1928 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe iexplore.exe PID 864 wrote to memory of 1928 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe iexplore.exe PID 864 wrote to memory of 1928 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe iexplore.exe PID 864 wrote to memory of 1928 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe iexplore.exe PID 864 wrote to memory of 1264 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe regsvr32.exe PID 864 wrote to memory of 1264 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe regsvr32.exe PID 864 wrote to memory of 1264 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe regsvr32.exe PID 864 wrote to memory of 1264 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe regsvr32.exe PID 864 wrote to memory of 1264 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe regsvr32.exe PID 864 wrote to memory of 1264 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe regsvr32.exe PID 864 wrote to memory of 1264 864 6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe regsvr32.exe PID 1928 wrote to memory of 1820 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1820 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1820 1928 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1820 1928 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe"C:\Users\Admin\AppData\Local\Temp\6854daefcb6bf04e35ccdb1bf08ce75315a3fc8bb19d0182a7eddd5bfe4ead7b.exe"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.cnlna.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows\system32\SuperEC_Hook.dll2⤵
- Loads dropped DLL
PID:1264
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5701⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\KKEA7BGZ.htm
Filesize427B
MD5774d13bb0fecd8fd1b141abc974c2840
SHA1683c8cfb5b5d2fdaf704d9fd8c11885a024e0ee4
SHA2564a89eebe118988c98ea41bc4540c8972a2e35ff2a616b933178dce75415191b8
SHA5120759bc9280458afcba4d8a86fb179c98a34f985049d50b4a14c4949d7c99a5c689474a77c9f3564e2ae06a891d53319bf82626ff60cd858e4dda6b93d16e5792
-
Filesize
608B
MD5d5c0e4ff8f9b0d693d20964acd741125
SHA1f04ba02fdb0cb6000a2a4701e6f87ff7a067fea8
SHA256fc7289a019969340bda457446a1d9a5b8fe5447f9bc127d5110eeb6a5c2e4877
SHA512fb30119ef77db4369a3c077547cd561d5c216f7bd87528b7b8a21273d9805355daa557811cba78b9f5e66bf309de1f59f32e4f875d866bb9901541b779bbfff9
-
Filesize
368KB
MD56446f02463634295797ff698eb7eb92e
SHA164a20417acf7c9bd67efc601236c85fa640426a8
SHA25653022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33
SHA512eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe
-
Filesize
368KB
MD56446f02463634295797ff698eb7eb92e
SHA164a20417acf7c9bd67efc601236c85fa640426a8
SHA25653022e175ff09af40a8569a641a261ed08dabc7331afbdde97f2f3d6f9321b33
SHA512eeeb4152b92f9c4cad35d596f6fdec8d4e26b93c1a71627007ce5e490c46bd7773cc65309645ace429467b335fea5fe33cb5aac4cf507367cd9ad72a1b9efbfe