Analysis
-
max time kernel
182s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe
Resource
win10v2004-20221111-en
General
-
Target
94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe
-
Size
143KB
-
MD5
52e17243bf995498ce4afbf6726adb5f
-
SHA1
841b95191bd57734579ae260c3aefa4567f4861c
-
SHA256
94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482
-
SHA512
9ff953131f0f2e86707165932951dde79ee3d59a5fab105bb7a13e0f1fcf3f7361d5d424c7d20ae0a846d2756778749153a80e9c7c8b56a7fca86d6c8dcc2c60
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DN:pe9IB83ID5h
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001512c8bfcbc61a43b0a416a1ffe3db3e00000000020000000000106600000001000020000000e5292838e9b7cf5d6d00508d3ce23cba3528af8d6952688531d92609822ae85f000000000e8000000002000020000000a3c1093d7ec90dbf32033ea949b83e48ade087462d536aacdef4d0cbcaecfba1200000004fd71098861457b8a270f731d6f3eaf97b04072a3f4919ca8d6ba81d849b1abb40000000c712b4046a7b4c2e3e2feaf017cd4b34c2eadc46786f06810701bdf3b22bb73979b9c2f9a105afeee77c256e2e4bdd69223a99cdc1e3b8433443094c34815d39 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3D72EC1-6EEE-11ED-8F62-626C2AE6DC56} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600398b7fb02d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376385730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 980 94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe 1536 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 980 94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1536 iexplore.exe 1536 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 980 wrote to memory of 1552 980 94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe 31 PID 980 wrote to memory of 1552 980 94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe 31 PID 980 wrote to memory of 1552 980 94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe 31 PID 980 wrote to memory of 1552 980 94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe 31 PID 1552 wrote to memory of 1536 1552 cmd.exe 33 PID 1552 wrote to memory of 1536 1552 cmd.exe 33 PID 1552 wrote to memory of 1536 1552 cmd.exe 33 PID 1552 wrote to memory of 1536 1552 cmd.exe 33 PID 1536 wrote to memory of 1924 1536 iexplore.exe 34 PID 1536 wrote to memory of 1924 1536 iexplore.exe 34 PID 1536 wrote to memory of 1924 1536 iexplore.exe 34 PID 1536 wrote to memory of 1924 1536 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe"C:\Users\Admin\AppData\Local\Temp\94983e8737d88f18f2e98a617bfbf790fb305cd5c0484c97613ed40c7603d482.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt36^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt36|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5167cfd90cb81d3dddd63f107249a0f2e
SHA139a78631cc336bb71fe7a02eeb91474bbc335eea
SHA2564c527164ea0096494cfd68b9e9167c0587c162106e8ec71edc705963c9fc543b
SHA512013a16d1dc963bf536a156ccb6ea94596887e1d774d6b18636000bbda06b57c135bac00ef046d18022b8512d6abb9bffd3c26b6d10998b4f0e86b46c319b7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD533055abb647e6ce6092010c7da901828
SHA15751f7c23756a7aec7a0980b05be9f8aadb81659
SHA256384616419836c81c5f9a965c2cec1286e1ff4197a9129c2006faaee0d8a7120b
SHA512a8dc8da2f929b2d4b960303071512fcd26cdf462136f318028b836166ba504deceb91069e7ec3d84f79b7e2539aabd23271dc2a88940e99d6c9019366e023d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5888624a0041e0f5485d34a1d6f0ea950
SHA179a98e747ea8c83d64eb3725c33404bd22d42c74
SHA256aeadb1524f9da18f3c030d4c5613424a35e366dde63c2d68f22a0df9f39ed526
SHA512722b049672bb6a34a81f9cf0dc2dce0881d496e76836a86e1dbcc23ea1f4abdc95f04d756eff7990243cd306e5ab8aa8250a4e4c09661fb881a345d04c07901f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5b7fdfbb630b35f53818103b59922534a
SHA12a101f1bf7b9666fbe31261db65cb2e428149fa3
SHA25621035bab68d3676d0b17cc4bde20bda8447fdf4861bfa1b2d9036d0adf116ca3
SHA5124c65b74110b617e031aff6be75c98318cf0004a83331b6fad16b60767435dc9a6ea1dc24bee8c26a3a7f720663deb2f6654e94659d6613259fa8a23cb5e5f1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD537bd7c12f072f124745763ec78b74e9b
SHA1b0184de77bb20a0328ba8cb459acf34520b6f018
SHA25616e74fd20fdab4f7a705b6c7338cae4a1b5943b8284dfa1646e8c3df6aa6f781
SHA5125261eae07a5246c3ec4786d1cdf177f5c9fb43f040b80c06c68ebc3f1c9d7db603a08e19fb12308bde20ccf0eee7f7cf4b26ec331084907f94217d8bbb5f3dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54f8fc35e5138a690eb9afd2141872bc0
SHA18259a4e495c5733bb6895f9118a6a2d0f262a23e
SHA25614c8a13c685800b2c8e0fac8b1c00d5e5d44dd28278a5223f559cbd7e4e236ca
SHA512d1847e91c167f6d4e86a4c46175f0e3323ce65fa61c33e3bf83aad7095f69b987f96bd2873a26bf76ad868496770a709ec389d43055646ee683a3577abf7a344
-
Filesize
600B
MD5322afa280c6fd3e26efbecc792e46acd
SHA10b884012b3a2d108738378cbaa9091c6367e5f9a
SHA25672bd252104c7cf0befbaaf151d3e5cf36d595637c23a6467df7b50a18cd408a5
SHA512728f8c53ccb0f0ec89eeced233f4efbb410df864f6424f67e6708a04c843db9c5bdad5a8e3d357e69c7b740f3b7efc305e2fe2ca154953c2277ae3ceefb3068d