Analysis
-
max time kernel
129s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 03:22
Static task
static1
Behavioral task
behavioral1
Sample
aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe
Resource
win10v2004-20220901-en
General
-
Target
aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe
-
Size
190KB
-
MD5
2a1b085320b311b977c4c02862d76fcd
-
SHA1
02e00f29130dfa972be70763cdb70cb63d10a65e
-
SHA256
aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90
-
SHA512
78d51a9f7178e47959c41dc88e7ed9cbbfcd2223dcdf70cab428903b92c5577a9ab53bebc40694c010bf41e8be19f5b03669a9f06084793ab5d364c2acc3db73
-
SSDEEP
3072:89NzEfwf32SvZZ+0UxVG/PedD2v+V1b4NMeMRzJ4uf40RLWhX66NsTU/pTC0F0cK:89eYfJvzB6U/qpcMei14uf40xEqCGU/+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1684-57-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1684-60-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1684-61-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1684-73-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exeaa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exedescription pid process target process PID 1428 set thread context of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 set thread context of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F43BFFA1-6FB2-11ED-AF6B-DA7E66F9F45D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cbe0d15dfd15764c98697e2934e934ee000000000200000000001066000000010000200000008c1df432a4e5c51e06fd452ec11701de4a300a7096c384a5da47aaa2156d2dfd000000000e800000000200002000000009e4d02807bc378f58f391e2f0ae774643b091a8d1b9daef1bca1b8ced53f5042000000009a76197b866574e6136d2d9fddec76caacfb6e5934d3f4356ded0146b9cbd2040000000cacabdef4b9f43ab1c9fe98d954adb9d32b29c81686cbe8b1557bf87e90368998ce2962e75206ffad039e9a216dab971d327a6aa5319cb0a323a2ea4fe5d3d4d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376469980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40714bd8bf03d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exeaa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exeiexplore.exeIEXPLORE.EXEpid process 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe 1032 iexplore.exe 1032 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exeaa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exeaa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exeiexplore.exedescription pid process target process PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1428 wrote to memory of 1684 1428 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1684 wrote to memory of 1724 1684 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe PID 1724 wrote to memory of 1032 1724 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe iexplore.exe PID 1724 wrote to memory of 1032 1724 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe iexplore.exe PID 1724 wrote to memory of 1032 1724 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe iexplore.exe PID 1724 wrote to memory of 1032 1724 aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe iexplore.exe PID 1032 wrote to memory of 1680 1032 iexplore.exe IEXPLORE.EXE PID 1032 wrote to memory of 1680 1032 iexplore.exe IEXPLORE.EXE PID 1032 wrote to memory of 1680 1032 iexplore.exe IEXPLORE.EXE PID 1032 wrote to memory of 1680 1032 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe"C:\Users\Admin\AppData\Local\Temp\aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exeC:\Users\Admin\AppData\Local\Temp\aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=aa26d955b2a5945e704d48298bd5d7027ef795e682b424829650d854b2873c90.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.04⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD59c471da7011c39af96dc00b4f69422c4
SHA155f3a4c7301e42c3eb9cbc377e51c183c797d40d
SHA25645accb17c2da8e33c00cae0d7fa7b6e5591a7a49cf3787f8475e3978ab71fc2c
SHA5128a1262ba6a5fb032b258ba8414c13fd67778da348f8d61245c879d0e35fc8ae9c1dac39eaac492799392a35e27ff09768782f7d5072cb13ee9a74e424c937c26