Analysis
-
max time kernel
244s -
max time network
356s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 04:56
Static task
static1
Behavioral task
behavioral1
Sample
db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe
Resource
win10v2004-20221111-en
General
-
Target
db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe
-
Size
933KB
-
MD5
12ed935858421fff7a1f90aa14eedf27
-
SHA1
639798c8135091898416d75ff2d47a75ccfe4567
-
SHA256
db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8
-
SHA512
10a2f33467327c4d79091ffbb9e20c815873f8f2f563e86d4954b386a072035cc06cbde27f9d32b79701079f66a33d02481fc5956224067234ae86d11bab09e8
-
SSDEEP
24576:hyVxp3LF+DAVp2K1s000LvZIlasyRxO2XPPiXft:UN3467g+PpSft
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 7 IoCs
Processes:
db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exepid process 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90771181-6FCB-11ED-8641-5263E908E3CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1640 iexplore.exe 1640 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exeiexplore.exedescription pid process target process PID 716 wrote to memory of 1640 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe iexplore.exe PID 716 wrote to memory of 1640 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe iexplore.exe PID 716 wrote to memory of 1640 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe iexplore.exe PID 716 wrote to memory of 1640 716 db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe iexplore.exe PID 1640 wrote to memory of 1648 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1648 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1648 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1648 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1648 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1648 1640 iexplore.exe IEXPLORE.EXE PID 1640 wrote to memory of 1648 1640 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe"C:\Users\Admin\AppData\Local\Temp\db48c68674dec6499fe73b17f662a3c0acf05ffbb81cf67a42635bad46d6c3d8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.zhendeshihuidaojiale.com/ZGI0OGM2ODY3NGRlYzY0OTlmZTczYjE3ZjY2MmEzYzBhY2YwNWZmYmI4MWNmNjdhNDI2MzViYWQ0NmQ2YzNkOC5leGU=/40.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsz1C1B.tmp\Base64.dllFilesize
4KB
MD5f0e3845fefd227d7f1101850410ec849
SHA13067203fafd4237be0c186ddab7029dfcbdfb53e
SHA2567c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554
SHA512584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a
-
\Users\Admin\AppData\Local\Temp\nsz1C1B.tmp\Inetc.dllFilesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8
-
\Users\Admin\AppData\Local\Temp\nsz1C1B.tmp\NSISdl.dllFilesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
\Users\Admin\AppData\Local\Temp\nsz1C1B.tmp\NSISdl.dllFilesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
\Users\Admin\AppData\Local\Temp\nsz1C1B.tmp\NSISdl.dllFilesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
\Users\Admin\AppData\Local\Temp\nsz1C1B.tmp\NSISdl.dllFilesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
\Users\Admin\AppData\Local\Temp\nsz1C1B.tmp\System.dllFilesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
memory/716-54-0x0000000074E61000-0x0000000074E63000-memory.dmpFilesize
8KB