Analysis
-
max time kernel
182s -
max time network
244s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 11:33
Static task
static1
Behavioral task
behavioral1
Sample
348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe
Resource
win10v2004-20220901-en
General
-
Target
348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe
-
Size
143KB
-
MD5
ea99aa4d2a21dc691976f30ee5eff8ac
-
SHA1
ff883881ddffa6597a3b99a24a7ffedc54bad986
-
SHA256
348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e
-
SHA512
6a9bd4107fe202bd2f2ea727c575592932903846e389aca0a70bdf9eafa6dbcc34223505670f6a9d36ac66c32ba6c4b5c11871288b8cc1d30eb53fb042313dc3
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45D6aw:pe9IB83ID52j
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb8000000000200000000001066000000010000200000000acbb2ad56c652adf7056f1e629e4500302c2ce30fec370573c8c2428085f611000000000e8000000002000020000000660977e766f7140efb219b66e3144eaf14d070b4a8b1e6aab9ec37606f00557620000000d9d8c2d634e2215b41624a902cf45875785842026128203bf3dd1d3d85c254bb40000000c8df69dd0015216b265f6c24a03c909e40dc298bf37dd34eab68dbd5861408bdb601f3e92c5aa13a29fafdc1e949a841f9ad26778d8aafa72128ec37e2ff9213 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EA77961-6EFD-11ED-A5FF-56A236AC5043} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376392016" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0564f5c0a03d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 936 348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe 812 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 936 348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 812 iexplore.exe 812 iexplore.exe 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 936 wrote to memory of 920 936 348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe 31 PID 936 wrote to memory of 920 936 348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe 31 PID 936 wrote to memory of 920 936 348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe 31 PID 936 wrote to memory of 920 936 348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe 31 PID 920 wrote to memory of 812 920 cmd.exe 33 PID 920 wrote to memory of 812 920 cmd.exe 33 PID 920 wrote to memory of 812 920 cmd.exe 33 PID 920 wrote to memory of 812 920 cmd.exe 33 PID 812 wrote to memory of 1448 812 iexplore.exe 34 PID 812 wrote to memory of 1448 812 iexplore.exe 34 PID 812 wrote to memory of 1448 812 iexplore.exe 34 PID 812 wrote to memory of 1448 812 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe"C:\Users\Admin\AppData\Local\Temp\348c0e4152c5fa97311c4f0ceeba8f3471c80f947ebc78dfe62aca396bd83b4e.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5167cfd90cb81d3dddd63f107249a0f2e
SHA139a78631cc336bb71fe7a02eeb91474bbc335eea
SHA2564c527164ea0096494cfd68b9e9167c0587c162106e8ec71edc705963c9fc543b
SHA512013a16d1dc963bf536a156ccb6ea94596887e1d774d6b18636000bbda06b57c135bac00ef046d18022b8512d6abb9bffd3c26b6d10998b4f0e86b46c319b7911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5bbb03def5378c8f4901fdf599acc1fdc
SHA16c9110b90c269ac18b5d24ab5d611bda13abff89
SHA25601aedc8aa4f5d3683942410a0fe91b3ddfc2d968bd1d829bbbde002504425074
SHA51284a33d0dab0a15b0ebff6071f132e0d0a551b585144c18cc589ee72572b916765997faba4e051c396b4cdc39d2fb9ec852f254b12cbe5c20f3289434b169b307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD558d462b677915026dd5e20eecb0f50d1
SHA10870d6f7d390eae33ac0f2ed5ba2c2a00147d3c1
SHA2560661f6a55f7eaee31ddf608c658d0a21d9e0a0273a1ccf7a2d83a4289cb70c21
SHA51206bb1a5262fef7067e83c761a7b7a603f13e621b19bf5d5d824d851db8344d5c4bd5a734194a42388ee5afdd1deccba6aef7727d2414c1aab75a8b8ceb244fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad56486f66179de1c601c87c90ea894
SHA197ff599190f9666966a06a8e50a4d71e3c43388b
SHA25608e4aa2a49cace424551c846516c066e8610b2de4cd484f83a8489dd32cbf376
SHA512cee96920ad42a522993bbdbc268cb1c3bb5d0939570059f8b78525360d366d0884ac46a5677ac42656646d66d1dbab8918e4947d15164a2d2b9605b441f79b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD531e254f6b616b9c0f9524f5d788d1f32
SHA180f740d81bdfd4d74cc21327bb2a32423b0336f7
SHA2567ca602c3c7a162632e15d4cd61a4b606a77993e2bcac957fdd785972d4211a25
SHA51254ca1b08e7ea4295f7a638bfb975f7595cced6259e866b0bbca743123b20196d3f76111e35190be5fa29149218e54f9af965f06eaaea385226087b5ed15ddfb0
-
Filesize
608B
MD525e0fee00296db0f8df343fc8e7e2ea9
SHA18d09f35f99cfcc3b26538241394cc25d97476fe9
SHA256f7fd6c9bcabedc823cb3b718bcebdfd2fe2d7f9dc060c3c66143606c2164d49a
SHA5125c37080fda9c73b451ce877fd1e51655d5bbcb3a6c57c4c70b452824e932f5e8a5f521b31398ec4d50cc8599949b023a5657b69db486c60c29b7fc01f98bbb87