Analysis
-
max time kernel
126s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe
Resource
win10v2004-20221111-en
General
-
Target
73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe
-
Size
143KB
-
MD5
8aa115f88e85d16d29a550f7bd7e54b0
-
SHA1
52900665c6f7d97a2a4d1f1f3783ad738a626f0b
-
SHA256
73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f
-
SHA512
a14280eae3ccc63d645ac7ed22fc5fb7ff62968b401134a1fca75f8a40c1a8e091de0d651476c9d1245dcb137733a9d1000669f9984bd5799793a132916c5ca3
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DbF:pe9IB83ID5XF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000b5652e72c46a39bbf60ec47182b4f33de995e4f0ad28ad5ae3d30e92ebdcfc9a000000000e80000000020000200000001a660823d71c42572d088bca15282bbcc0ac3f710ab267647a0eca48bdc0b18d20000000d06ba96a64de98f7016b32a27b28a52bbaeda84739b28fa1e661a729e1d54cf8400000002f506f0e19365717371c6055b48d2b5f2684dfa24f7445884a7a174f9b9cad06a17d32feb9f8716496ab5aa6c777e40139331ffa1ff3e096fc3d06c9d244c030 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809726e60c03d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376393131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F5A3A81-6F00-11ED-B4FB-76D99E3F6056} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1444 73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe 1076 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1444 73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1076 iexplore.exe 1076 iexplore.exe 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2036 1444 73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe 30 PID 1444 wrote to memory of 2036 1444 73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe 30 PID 1444 wrote to memory of 2036 1444 73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe 30 PID 1444 wrote to memory of 2036 1444 73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe 30 PID 2036 wrote to memory of 1076 2036 cmd.exe 32 PID 2036 wrote to memory of 1076 2036 cmd.exe 32 PID 2036 wrote to memory of 1076 2036 cmd.exe 32 PID 2036 wrote to memory of 1076 2036 cmd.exe 32 PID 1076 wrote to memory of 784 1076 iexplore.exe 33 PID 1076 wrote to memory of 784 1076 iexplore.exe 33 PID 1076 wrote to memory of 784 1076 iexplore.exe 33 PID 1076 wrote to memory of 784 1076 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe"C:\Users\Admin\AppData\Local\Temp\73fe1a55d1e84132f97ed7d0caf14ae4174f64100ad68a50686b1a331bca1f2f.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt36^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt36|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:784
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57ef66f502cb164d6d88fd779895d5e07
SHA175c68e887afe0041c18bc01dc36ae719db07a436
SHA256084f8949af79ac48c5c245e4bbeea807949d1e8e182e7d0487227231fcd97a77
SHA512419b6e5def7e1051af856ea4256235fa4f1bdbf001b54f1db9e59c44f7da8f9cfa8d63f77e35345ec6d5c3ab13de10094281d44f42a7e1fd9d92b3b68ac5ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD560ee2deec2d78e60ca4d346d2f989de0
SHA1d84a625825b41446acb568ac6c590b153535251f
SHA256c4c5226717c52ee10858a471404c555af544bc2e9700017fdbcba57bcb87f93d
SHA5121f0f8d4a2224d78adbf6169b27391c28efd81b14560b604c2c5e76355d6e21f901b0672682c123bd00881b1f0f5caceb15e29c7b6c4d9e8a6f933e2fd525fd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD521a1330c1ceb026415015fdf68b2a638
SHA16ad0bfe5ee4e0673ed8657274f3087f42ae078a8
SHA2569096a53cf25f93475bf61870e68b47dee5849c4c016a4d22a4dc03820df25bc5
SHA512f9c5cc17a679d44541d952761f4ac8395c1ddb60135e93c6265ec78e9ded4d98ae5b7dfd352ed9886c2c885f5980e8cc65dff33b5c8d1ee21e9e06fcfc4a941a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be5757de35d450e9e843cf72907601ef
SHA1cbf0833ec7fe6d0e05457f0309d39007ab88c460
SHA2562f28e7b0203fdad4731a4739e2b73c0e498a1e24cfaec6afbfa86ef8333340f6
SHA512c7e0643a9ef2de51aeb52e13566d6d2828efc266e31eb45c76b2752f1e331bde4a23b19a18db4caf7ea5550c559adf0c5766b17f70ab1628caf30f012261a8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD58e3b21fef0664381a0fd5f1532addca8
SHA1636d12c861c4a5d47bc5e6e240231b82c23ac707
SHA2562a6fe04ecf1e69f0eb567a2ab9af373099f3a6843435c1a595c0f2c2020afd10
SHA5124d7337c4fc4a6491a4184e266e4d9f6da2881071c5ecef55762f6e6c81da36f451034b567504782c76c8f8dd7c6be51528c67757bf3153a7fc347fa4954b4422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58aa28f0178a56a47e9acc416658ec87f
SHA1397cf6fe57a806cbfacfccf974a11f764d403745
SHA25680ff44978079c74ccf9453d0daa1c10e0bccbb1b388f0c96cbee90581672ea84
SHA5127d24c82b374d5e40a152e14b3cb4ad327986bec3105961ea27678147f57debc64421436efb2a7ea3fbf0a54f806ec688e9d2f21f6d1d0403e3e0bb069664d050
-
Filesize
608B
MD553bbafd4044def6d62d36a5de3ddbef9
SHA117f7100f1e4a7ce504534b772a279b182baaed39
SHA2569cbede0a527342a492e5c56f1ab17d248cf152ab356bd66745801c2178b275a5
SHA51217b4ef256e9e02fad2fd5ba546435e18654ce662202b3ae3174183310d5c7daa52b93af1ebdd6a316bb696bf91ad7c5d84ff6c78fa086ae6ce747af1d7429ac5