Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 12:25
Static task
static1
Behavioral task
behavioral1
Sample
c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe
Resource
win10v2004-20220812-en
General
-
Target
c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe
-
Size
143KB
-
MD5
29b0ebd5011a29fdf0e0d9a4e6f53069
-
SHA1
b7da31337cc801e9674f64e32c971fb3695b6c8f
-
SHA256
c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899
-
SHA512
d4a67c41a946f4c2c51caa039ddd344ea873dfd287e2019be3fb2dc4ff9f933bd97f1e927444b82c746fd6c074541d8d7ec908ff10cc94142fc9c0f85a677348
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DQ:pe9IB83ID5E
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b77ad11403d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376396510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004228c82d8cc3cc49bcf22d624480754700000000020000000000106600000001000020000000cbec120e587ffc17bde1dbdc51578b1e6834544f6bb334093ad6b0aa3371125b000000000e800000000200002000000090a956e48d53c65564bec01e0734e47649a13018cd27864e1230aab942f677612000000050f69b7763a6c068f3c2110ad4e672313e704ca074c29bfefacdc9c51d3dc851400000002f57886e807f2f1bc1123ae62d5b9da63b6c84c459ef03ad774661ccc968f1b5b670fd83ca309f129765144770206d222e183f5a60d1f52f57898ac52264b36f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAD72581-6F07-11ED-A23F-FE41811C61F5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1672 c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe 1748 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1672 c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1672 wrote to memory of 680 1672 c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe 30 PID 1672 wrote to memory of 680 1672 c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe 30 PID 1672 wrote to memory of 680 1672 c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe 30 PID 1672 wrote to memory of 680 1672 c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe 30 PID 680 wrote to memory of 1748 680 cmd.exe 32 PID 680 wrote to memory of 1748 680 cmd.exe 32 PID 680 wrote to memory of 1748 680 cmd.exe 32 PID 680 wrote to memory of 1748 680 cmd.exe 32 PID 1748 wrote to memory of 1796 1748 iexplore.exe 33 PID 1748 wrote to memory of 1796 1748 iexplore.exe 33 PID 1748 wrote to memory of 1796 1748 iexplore.exe 33 PID 1748 wrote to memory of 1796 1748 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe"C:\Users\Admin\AppData\Local\Temp\c951235484d5d4e563bd8a3a0b7ee773e627770c2bdd15fed7c3007aacb39899.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57ef66f502cb164d6d88fd779895d5e07
SHA175c68e887afe0041c18bc01dc36ae719db07a436
SHA256084f8949af79ac48c5c245e4bbeea807949d1e8e182e7d0487227231fcd97a77
SHA512419b6e5def7e1051af856ea4256235fa4f1bdbf001b54f1db9e59c44f7da8f9cfa8d63f77e35345ec6d5c3ab13de10094281d44f42a7e1fd9d92b3b68ac5ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD525688da35c4b709b237e4f1ed1f1869c
SHA13ea09f0154ab97b48d3ce123596965821fe90ef1
SHA256af67ef98ac8d5f47d618648ae6e17d060a382721e50efb223f164cba1b2c3015
SHA5129bbe8ba14974c26fa5c6401680476f5da368ba43d8b4709127049485803f58ac0694e895e2540eb9b31d2b856dccec78a62d8efe3b89cd0fde81310ec5a8c57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5e90af39e148323c7dd7bc9fcc2e3876b
SHA10c09f2374b1840dbf95d301f65819086a8fce22c
SHA25697c6e6f9983be21a5419406554abf365dc760669c7e628fc50e347b3ad1095a5
SHA512e5aa49017e0beed54d7acbf30790ea04972598f8e59797804b5bb52db6b515e55329c0bae0cbb8cef313c10bac3676101ac241dc8acaafdaf715582e1a829f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD553db95cf076bd769fd6ad50ace8f8d23
SHA13f2d3e1c959d36d7ca1c2c612a4cdd06e086c1fc
SHA256ba663af35bfe32709c8beaf53b51bc7f148463d5cad5a72d4f9ee9f58373b17f
SHA512b6f2dc0d6f5d6b2f6e900891b0da849dd6b1b2adbb57d962255f3df02fab99d0095c1f5bb3a5ae98153bad7e471e4732635b5003b995820063853ebb6ca80880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5371c9f7ee5e8316e0df0918b11c03825
SHA15c170a802f70b3282fe2d729df2d18b7c83f2cbd
SHA2562fa9ba9addc6573f4655a1e05a7977c912a98864fee892cf108f55adde7f47bb
SHA5120d35a9a7ce64af62024e2be140370aa887adddcf42e9fb7eff0186d4deff857440f49540f45ff83b97c00220eb1de134303f4d9101330a190586295eb0179707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5370da7f41648ea50f1aea4db48cb14a1
SHA18c751b6d4ba92b2abaeb4f51d24467db86debeea
SHA25612c6286bc443cbf62cedf8fa321675fc553f76b6b6732c1619032cc9f2635c93
SHA5125041fa73156a6b36c2a1fa202ac348880822989abca00c4e1b8f3f536027fb54a2e47f299299808b40291b4deeed677cdd670a2b3bb086f015430e440391010a
-
Filesize
601B
MD516c4cfce7142471a2b44f0d30b9a5fc7
SHA1f9dbb0b1e92f7bf57c08ff6e0942e4fc2c3d5b05
SHA25642ce3011a4233c66f9f8887e3a6bf81576181fed8e036f9cd2c9cbbeff6bc28c
SHA512b895b46e7af361d1969e6a887ffcd442ff30fa4d15b72fb4bab7743d39b4c91bb5afb73bb5f8572552a0a2135deef9937a729879fbac44a5a6579c3248f6cea4