Analysis
-
max time kernel
147s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 10:10
Static task
static1
Behavioral task
behavioral1
Sample
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe
Resource
win10v2004-20220812-en
General
-
Target
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe
-
Size
143KB
-
MD5
102d69aeb2780bd233cb0854ca9f60c4
-
SHA1
8d9ec5eeb5bc2ce8e3614dddcdfdc19fa5c08c90
-
SHA256
0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c
-
SHA512
6b46bcce6e05b76fa342d5ab8f919a15cd3319b5437cecb55705f413e675d8637607f3b52b31f4be7b725f84f324dc448f24cfea0335877234afacf8ce7d553c
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DQ:pe9IB83ID5M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af00000000020000000000106600000001000020000000f9cb644933dd6137008769b2d8e22672caa9054f1db8d7e38a58965118715474000000000e8000000002000020000000f24a83dba308e02d23eeb4e5cad91c8303b4a03e49b3c7f4af1b1070e18dd87f200000006c42eaac06ad4b304c85d113e578aadad0d73d7da36321e237f961f7d1e0f484400000007f1d0920c2a71803d0731cc044c0674ef05383331e2143829c0485738b5281ef15f0198eaa04672279a2dfe798b4f3a0a6298010bb8f925a4b72153bdeb3fded iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a9c4f0fa02d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376385381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{031AE741-6EEE-11ED-ABF5-56A236AC5043} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1356 0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe 2012 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1356 0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1448 1356 0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe 31 PID 1356 wrote to memory of 1448 1356 0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe 31 PID 1356 wrote to memory of 1448 1356 0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe 31 PID 1356 wrote to memory of 1448 1356 0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe 31 PID 1448 wrote to memory of 2012 1448 cmd.exe 33 PID 1448 wrote to memory of 2012 1448 cmd.exe 33 PID 1448 wrote to memory of 2012 1448 cmd.exe 33 PID 1448 wrote to memory of 2012 1448 cmd.exe 33 PID 2012 wrote to memory of 540 2012 iexplore.exe 34 PID 2012 wrote to memory of 540 2012 iexplore.exe 34 PID 2012 wrote to memory of 540 2012 iexplore.exe 34 PID 2012 wrote to memory of 540 2012 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe"C:\Users\Admin\AppData\Local\Temp\0355dd0f6c0b02bbc6ac77764296352899c348d46b132f18ab198c6425fead1c.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:540
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5167cfd90cb81d3dddd63f107249a0f2e
SHA139a78631cc336bb71fe7a02eeb91474bbc335eea
SHA2564c527164ea0096494cfd68b9e9167c0587c162106e8ec71edc705963c9fc543b
SHA512013a16d1dc963bf536a156ccb6ea94596887e1d774d6b18636000bbda06b57c135bac00ef046d18022b8512d6abb9bffd3c26b6d10998b4f0e86b46c319b7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56ac80c56fb60b3a06ed1215291b959be
SHA10766a5aeb49d24ac4f04af65a48653c61aefbb83
SHA2565eda4573d8fb2fb4f58a4f78a1807475e7b96e1ad656f569cc92734a99ef3732
SHA5121d5063268d57e3bca5023b21cf6d2e789ca6164b5a5d02e98c89d3f56955cf737b00e1bf3942593cc0659873aa0c7438d1293314bd2b573008ccc0028cff9a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5a187f221a73e6efa710ea472e25f2adb
SHA1e2f0557432a89b8c9cb3672947f2630b2d97578c
SHA256280b2bd42ff782509c21449df993c92c79fcd627a858ea5391d38fe13d46a05e
SHA5123a5ed4276ec2e6167368bd26e31b2fddeafc306f0954e9a3ca394e05379cc7c25f679bb7a4ae8c884e269400fdc23210f86910ab2ab2d8634b269dddffcba92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e58bc5059af9dc9e11a158e53afea6
SHA172dc420ee9357291d451dd1a27c52a14e1f355b5
SHA2564e018623a238954e23f227047bf02feb9e7b7cc90a3cb84f1b41db2545568bcb
SHA5127e038b8956783892b36c6e9bade7dea86ea60de0655cf24a50bab3456257be9cf4363e9d57e5a1d9b7c85e6b29f205ed4216cd19378ec08854ef5a5455a77a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5749e000b793068539ca520fab669327a
SHA190f5c2461013fc19cc816a1b6d219e8817ffd810
SHA256668253897d62c7127acef1a89365271ce162d45d00cd081dba2da4dcf7194872
SHA512e7bc7525301188cc3c1e46f5a69d2c476a3b448841b3adb3f64abdfb68f49ea5a615d987daa7480a2412918662ecd459dcdc81b38fcdec3bf636fb46ec6ea68f
-
Filesize
601B
MD57e5f942285aa4b1cc5ff2cc97972b0a4
SHA1251fe65f1e3972aec1c7eee31fcb9b809df76be5
SHA2567801c5514e99e99ae3881ed6bd21ea9efa71808bf5afadfe5f3f45ec9b22b95b
SHA51285abaef0a5c1428dd168dbece18f5d265d76aa3fdd5b6609931b2043f43b3bdcf4a5dcc3f2468f7a3ebfede87039a6169ae4b6f20e9aaa1a064e3619332bc7df