Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe
Resource
win10v2004-20220901-en
General
-
Target
4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe
-
Size
143KB
-
MD5
d1302379f2222a6f65f1aa6fdb072ace
-
SHA1
59b35b0099d1dee00ebab458e737ee011e7276bf
-
SHA256
4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d
-
SHA512
2550d6eced93096f4ddd444dc59b60f2c873c57ab64cd21797fd03cecb1acb119048f6e7415a6be3ca65a940cc671b8e40053ee5396bbf609bb9911493599cb3
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DEv:pe9IB83ID5y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000717d2938d9bead408c8b8889abdaa05000000000020000000000106600000001000020000000de9cfa84676e30416b1ee009a8224912f789e420011b969fe077f015767f754f000000000e8000000002000020000000923d1fe2251e299d6585bd62b7b709282a3666baa619aef859cfba2a033826e220000000d5ad349c59a62b9f0b8884fbb49e39059e04505a59bc8a82d96f0a04d80709b340000000f276efea98558ec5dc7834567137f0f97b5ab3b63af03685dd6d0bad01e602416a91c01ee438436b9320a70c42f2f09097bd7bcc89d35035238a013c1ee16a87 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c26a632303d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D27F421-6F16-11ED-A993-42FEA5F7B9B2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376402739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1340 4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe 1940 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1340 4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 816 IEXPLORE.EXE 816 IEXPLORE.EXE 816 IEXPLORE.EXE 816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1008 1340 4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe 31 PID 1340 wrote to memory of 1008 1340 4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe 31 PID 1340 wrote to memory of 1008 1340 4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe 31 PID 1340 wrote to memory of 1008 1340 4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe 31 PID 1008 wrote to memory of 1940 1008 cmd.exe 33 PID 1008 wrote to memory of 1940 1008 cmd.exe 33 PID 1008 wrote to memory of 1940 1008 cmd.exe 33 PID 1008 wrote to memory of 1940 1008 cmd.exe 33 PID 1940 wrote to memory of 816 1940 iexplore.exe 34 PID 1940 wrote to memory of 816 1940 iexplore.exe 34 PID 1940 wrote to memory of 816 1940 iexplore.exe 34 PID 1940 wrote to memory of 816 1940 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe"C:\Users\Admin\AppData\Local\Temp\4d77d974027014dc8e98e4fdd0ccf9fb1de1ada14c9a6d137584cfc61814450d.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:816
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57ef66f502cb164d6d88fd779895d5e07
SHA175c68e887afe0041c18bc01dc36ae719db07a436
SHA256084f8949af79ac48c5c245e4bbeea807949d1e8e182e7d0487227231fcd97a77
SHA512419b6e5def7e1051af856ea4256235fa4f1bdbf001b54f1db9e59c44f7da8f9cfa8d63f77e35345ec6d5c3ab13de10094281d44f42a7e1fd9d92b3b68ac5ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5fd4958adb7234a82d4d59885529ad925
SHA1d2c91e7e48dd9c9bafc769f2576ef938a64aca58
SHA25673cb1d8a16c222b4d12979122c1724b616b52cd4347fcf93f628768b99cfbf6b
SHA512843c71952c043bdb82886076b369ec4f7b89ce50f4e7b13a24e8d93111e0877492c8b24a7e155a78aae98fb1c92b338b1e6afe4ffab5e8c37e8500b2aa01c404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD59546ea8258adccaf64eb2765d118a430
SHA1dea17ce2e78b8e131ed697a45e7dded38d050ce8
SHA25608ec091f208b65a32c5118628106e10be0354fc558c5817d43c482a92963e3d9
SHA51282c600f6ccc4768d694b4834a09a7b7e5d533e855aa2f0d00cd6c848d20843bd39e8a016e96b9e7ffe52444574fcdaf3b289afb6a5b2f045aa8769313494e5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD56ecbb1ffec1ace17dbc05b101bcdcb1d
SHA1f4a87f714c9c1c75f2ae7aa352d287247ae42a63
SHA25663cbc999dacbb5c6c1f11e032a4a7d8300306e9eaba55661a2efb2400bc58569
SHA51255e32d942831f8d790ca79dfdbc62de59fe64f5ee4757adb9907a3a317f3a591e90443aa16255a7792fe46cf3da6377a26714ba0c2024b3e430587b89e30b30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5b514450600a02be2ee4bfe617712ed00
SHA1beea4cb5e7ef743e58f5a920e6414f35ef811ced
SHA256010637f1a4e49374861d76485f7f6a6e4706f063a04212b3fafe19116233f576
SHA5128a872eb6aa63a69ce009c2dc716d9aca2c63ac439114b84bbf03bde604570f2d99b1effb58c90ecfca261665f3617cbc60a808511d6850d0b839c1e27fdb4ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD558c777c9de4c8dfebfa85ae9380f993b
SHA140dae576ccf03d0ad8b8159dc0068ebacf2eb46a
SHA2563961a013b77ae89e592f1b4a3e6f6a32dff46dac3e3dc6f783bb339341d7f4b0
SHA51265c3066115495f0225a74a3a73910276a12339532e21ca807ad1ce8c7917c184bff88ff211fcdc0f0736cd458e8c58f2c2e1dcc80d6e2e48e58b49a3a981ebcc
-
Filesize
608B
MD51ed8ebbbe885b62d7aee96c5b6e21de3
SHA118469d29ed88af14faff411c40c2c18ec2da4969
SHA256de3f173c36dd2043f1a0e86839767e5e8fc2b568b8755a6ef9967b9b28ea1c39
SHA512998c54a120fd3b31b890132ad5d022d491ba63cd66165cab6a77e1743b20c827b2e2252f47321636f05a421b958431a94716fa34c858c0c4d19b2aba99d5e33b