Analysis
-
max time kernel
114s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe
Resource
win10v2004-20220901-en
General
-
Target
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe
-
Size
1.5MB
-
MD5
706b469baa166256569c23e90bf65c5e
-
SHA1
d971fef90fe31ece0ac7458c6837013ba43601e6
-
SHA256
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7
-
SHA512
06944ecccbf540113bc5ae7ad4e970e83c3d68392b06f21aadb79b2daa86d8958983866f62985aa1fe000d05b1dba7b722e4b5675fdbba01bf483e9700f97170
-
SSDEEP
24576:qHx7qhZjeDAIE61ag+uqGDkbfaUf3Sst3E+kf8FWmdcvPOCsknaEzVZxdw3Vx+49:qRg2h5vUXqst3E7POUaEzHE+nU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1416-55-0x0000000000330000-0x0000000000368000-memory.dmp upx behavioral1/memory/1416-57-0x0000000000330000-0x0000000000368000-memory.dmp upx behavioral1/memory/1416-60-0x0000000000330000-0x0000000000368000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\AnntraxCoder = "C:\\Users\\Admin\\AppData\\Local\\Temp\\68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe" 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB10D051-6F2E-11ED-A7A0-663367632C22} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af00000000020000000000106600000001000020000000559e2482fabccd42a2535b520a90c3fc99f29a5a068a1367e960f10e678e77ae000000000e80000000020000200000003794954ed61844f1008310dbb4a0200d71c3d78231deae5b0ca9576b014fab4320000000944e0a08b18fcafc4b96216a27b30a29db15a4a39d08f5f6c5ba09cbdc75b31840000000b55d6c760b39bbd259cc929a1d34cff305f0ce9a57836a6fa6dd8219a05b86c9d3d610e9d67f2790e116e1d242101db61c9dbfb45c7fbc2d10beb31a06f37dbf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376413160" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d289923b03d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exepid process 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1304 iexplore.exe 1304 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exeiexplore.exedescription pid process target process PID 1416 wrote to memory of 1304 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe iexplore.exe PID 1416 wrote to memory of 1304 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe iexplore.exe PID 1416 wrote to memory of 1304 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe iexplore.exe PID 1416 wrote to memory of 1304 1416 68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe iexplore.exe PID 1304 wrote to memory of 1852 1304 iexplore.exe IEXPLORE.EXE PID 1304 wrote to memory of 1852 1304 iexplore.exe IEXPLORE.EXE PID 1304 wrote to memory of 1852 1304 iexplore.exe IEXPLORE.EXE PID 1304 wrote to memory of 1852 1304 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe"C:\Users\Admin\AppData\Local\Temp\68bfc82cf7cc58f72851fa02872e55d860ba867a6b57e66d1df56ded04bce1b7.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://whatsappnovidades.com/cont/cadastro.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5de52b278bba77d91ce520f9532214317
SHA1afcd1600fe93f5d39e242abb2ff3a8fd2d8e2c86
SHA2564826ed52bfb677cf503f56aa753f82802492a5338ca51f68665b7c37b70b3cd5
SHA5125c7fe3841880229280b58e2bdd8dc227779f97d701fb88e9810ff57ccb5f9361059ae70f9509995d3bbb0fe20c34339a0414a0f2811e01b68e4bdcda8d46c15b