Analysis
-
max time kernel
149s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
copia do documento.paf.exe
Resource
win7-20221111-en
General
-
Target
copia do documento.paf.exe
-
Size
132KB
-
MD5
acdb106a9198ea196969ddba272a460e
-
SHA1
9d246c7c3a0ea14ebe888015596964440606748b
-
SHA256
ffb9ba821cd0568e49e14db738158167c451e4747871339875f47d10e105132d
-
SHA512
5397f6cd799ebb4623e73a5b5ad361977d5508bd3465fd84ce11af6ab2b37eca23e005efde70e84d1ac379373fc0171af722d6741cfd27023680ec1c121f3590
-
SSDEEP
3072:fEJ4oxJrPhqrrm8Hj7ijhOHr3QVdAdjdrl2K98gXZsQ45GBdX8ckFQLGLCM:fIXxgGj5M/kFQLGLC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 29112022.exe -
Executes dropped EXE 1 IoCs
pid Process 2640 29112022.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 29112022.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation copia do documento.paf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 29112022.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 29112022.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 29112022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\NoExplorer = "1" 29112022.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376470208" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{843E199B-6FB3-11ED-89AC-5EAE84113378} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 532 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3836 copia do documento.paf.exe 2640 29112022.exe 532 iexplore.exe 532 iexplore.exe 4748 IEXPLORE.EXE 4748 IEXPLORE.EXE 4748 IEXPLORE.EXE 4748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3836 wrote to memory of 2640 3836 copia do documento.paf.exe 78 PID 3836 wrote to memory of 2640 3836 copia do documento.paf.exe 78 PID 3836 wrote to memory of 2640 3836 copia do documento.paf.exe 78 PID 2640 wrote to memory of 3320 2640 29112022.exe 79 PID 2640 wrote to memory of 3320 2640 29112022.exe 79 PID 2640 wrote to memory of 3320 2640 29112022.exe 79 PID 2640 wrote to memory of 620 2640 29112022.exe 80 PID 2640 wrote to memory of 620 2640 29112022.exe 80 PID 2640 wrote to memory of 620 2640 29112022.exe 80 PID 2640 wrote to memory of 532 2640 29112022.exe 81 PID 2640 wrote to memory of 532 2640 29112022.exe 81 PID 532 wrote to memory of 4748 532 iexplore.exe 82 PID 532 wrote to memory of 4748 532 iexplore.exe 82 PID 532 wrote to memory of 4748 532 iexplore.exe 82 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 29112022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 29112022.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 29112022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ = "1" 29112022.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\copia do documento.paf.exe"C:\Users\Admin\AppData\Local\Temp\copia do documento.paf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\29112022.exe"C:\Users\Admin\29112022.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
- Installs/modifies Browser Helper Object
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2640 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\SysWOW64\regsvr32.exe /s c:\Users\Admin\avjraebt\avjraebt.dll3⤵PID:3320
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s c:\Users\Admin\avjraebt\avjraebt.dll3⤵PID:620
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:532 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5acdb106a9198ea196969ddba272a460e
SHA19d246c7c3a0ea14ebe888015596964440606748b
SHA256ffb9ba821cd0568e49e14db738158167c451e4747871339875f47d10e105132d
SHA5125397f6cd799ebb4623e73a5b5ad361977d5508bd3465fd84ce11af6ab2b37eca23e005efde70e84d1ac379373fc0171af722d6741cfd27023680ec1c121f3590
-
Filesize
132KB
MD5acdb106a9198ea196969ddba272a460e
SHA19d246c7c3a0ea14ebe888015596964440606748b
SHA256ffb9ba821cd0568e49e14db738158167c451e4747871339875f47d10e105132d
SHA5125397f6cd799ebb4623e73a5b5ad361977d5508bd3465fd84ce11af6ab2b37eca23e005efde70e84d1ac379373fc0171af722d6741cfd27023680ec1c121f3590
-
Filesize
64B
MD560e70a9d67465323f659f6dbfd7250c7
SHA13a91f79a8c4326fd928bc3775cef0f9c71caf77e
SHA2563005b3a88c12d57b51583bc71f33a13a659a4c4e2e3e7ad274775a148f1d26d2
SHA5120c5372f182fd51fbe4acd1e602aa41249250b9c9a2d5b4cf399f220d4ca41ddb07d44f2f9be403285bb5cf8461a7ebe4eaf5c7ddb539a60344db1d4d6727da15