Analysis
-
max time kernel
123s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe
Resource
win10v2004-20220812-en
General
-
Target
acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe
-
Size
56KB
-
MD5
405e13e56892ffae299019ab65fe1e15
-
SHA1
11a8ab4a0a50806dad14259431bdbb874528bc43
-
SHA256
acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b
-
SHA512
12249d0c3989a452906df7eb0d19833117940c037db050c9f07e05518f053fab363082ca64e9d165e53aedf608141ef8d71ace84b796dbafb50123723fcd84b1
-
SSDEEP
1536:3oLDYsacy7mHMowHjXJpw5AeUEEc+xtkZQJKFTiZ8:3oPyys5jXJpw5AeU5c+xttMFC
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 536 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000069a834b3cae0e44eb6b4b9e9b8899c0a00000000020000000000106600000001000020000000af62f63ac371810ccd23279bb62e647287d5ecef2b731570af97043c509bbf77000000000e8000000002000020000000b6fd15611b38ac13f2a3acf5375e99d313a7bde2d23c461b9de676a3a45b93c620000000bf457dc0eceabebecc453f524134ebf5f3821e573a56d915390e66679140780740000000a50f414bc4b8203ade53f5baeebd14b79b8fd00f67555edd8e25d31c63da2eaaac80555af9b63d9cdc35be939862543cf0218686dfa32238983e6184538ff9d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B99A991-6FEB-11ED-B68C-6A6CB2F85B9F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30001b8df803d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376494307" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 536 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 864 wrote to memory of 756 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 31 PID 864 wrote to memory of 756 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 31 PID 864 wrote to memory of 756 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 31 PID 864 wrote to memory of 756 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 31 PID 864 wrote to memory of 536 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 32 PID 864 wrote to memory of 536 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 32 PID 864 wrote to memory of 536 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 32 PID 864 wrote to memory of 536 864 acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe 32 PID 756 wrote to memory of 1736 756 iexplore.exe 34 PID 756 wrote to memory of 1736 756 iexplore.exe 34 PID 756 wrote to memory of 1736 756 iexplore.exe 34 PID 756 wrote to memory of 1736 756 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe"C:\Users\Admin\AppData\Local\Temp\acdd951a428d4fd7b2da757fb7d151e11ba1b8add11ae5548014f3897a37284b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://myredir.net/K_Y0OxVHTtzcWeubp77DRaqWpG2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im Y0OxVHTtzcWeubp77DRaqWpG_has.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD500a4c0e047205fe59ab07d4bb2c71014
SHA1714d95fcb731a956fd04f05c7c4836070bec51c3
SHA256a28a457dade009042b5018e96b528f7715fa3f94e269c6cb4ccaad102c7d225e
SHA5124bafdce3614c7e64a54a1243dded6d4aa8e739404d05cc5b34968c3aa39ebf10b9a6eea88e46037069bc64f7a432cbf65400802e57533ae439dec6e047810e02
-
Filesize
608B
MD55e426e73e912adef96419440ce4b9b23
SHA1d58ba20eb7d9161a00a1d418c8dce24f3ee7b5a4
SHA2562831c9bd07497bfae9f21d4e1f1133c82fecfb56080e92cfc70dd8f9b298784d
SHA51251ad06a73e23e0225a58074a9f87f0d84d0325a7262bfffe1daf021a5131ddf014f6e0e78a0fba0dd96d70c80d26f49bb1b9d5766edf65607f87ab52574a872d
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934