Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe
Resource
win10v2004-20220812-en
General
-
Target
b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe
-
Size
84KB
-
MD5
aa1be9f021d85c53a925b08b20f13116
-
SHA1
f8aae5cc5dc8f3b3d664309e0322caa64cc77a60
-
SHA256
b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028
-
SHA512
092b94b840f12d85c864422c355ecda6d4bcbef31c2903f098d0a2d4b7dc0a9a47a19a2817951296971ad447da61da9a07c4899de6ffbe64166a2476b11f0f19
-
SSDEEP
1536:NxTZKytYVaKArvWv+v5Ry+pyDMqtcAvxgYD2Fqhi/V:VIgFvLy+QgqG+OYiYEt
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Internet Explorer = "C:\\Users\\Admin\\InternetExplorer.lnk" ctfmon.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\Policies\Explorer\Run ctfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Internet Explorer = "C:\\Users\\Admin\\InternetExplorer.lnk" ctfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ctfmon.exe -
Executes dropped EXE 2 IoCs
pid Process 3304 iexplorer.exe 1332 iexplorer.exe -
resource yara_rule behavioral2/memory/4868-135-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4868-137-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4868-138-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4868-141-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4868-145-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/1332-156-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/1692-158-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/1332-161-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/1692-160-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/1692-162-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/1692-165-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum iexplorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 iexplorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4588 set thread context of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 3304 set thread context of 1332 3304 iexplorer.exe 83 PID 1332 set thread context of 1692 1332 iexplorer.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1692 ctfmon.exe 1692 ctfmon.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 4868 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 3304 iexplorer.exe 1332 iexplorer.exe 1692 ctfmon.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4588 wrote to memory of 4868 4588 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 81 PID 4868 wrote to memory of 3304 4868 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 82 PID 4868 wrote to memory of 3304 4868 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 82 PID 4868 wrote to memory of 3304 4868 b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe 82 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 3304 wrote to memory of 1332 3304 iexplorer.exe 83 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84 PID 1332 wrote to memory of 1692 1332 iexplorer.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe"C:\Users\Admin\AppData\Local\Temp\b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe"C:\Users\Admin\AppData\Local\Temp\b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\iexplorer.exe"C:\Users\Admin\iexplorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\iexplorer.exe"C:\Users\Admin\iexplorer.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe"5⤵
- Adds policy Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5aa1be9f021d85c53a925b08b20f13116
SHA1f8aae5cc5dc8f3b3d664309e0322caa64cc77a60
SHA256b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028
SHA512092b94b840f12d85c864422c355ecda6d4bcbef31c2903f098d0a2d4b7dc0a9a47a19a2817951296971ad447da61da9a07c4899de6ffbe64166a2476b11f0f19
-
Filesize
84KB
MD5aa1be9f021d85c53a925b08b20f13116
SHA1f8aae5cc5dc8f3b3d664309e0322caa64cc77a60
SHA256b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028
SHA512092b94b840f12d85c864422c355ecda6d4bcbef31c2903f098d0a2d4b7dc0a9a47a19a2817951296971ad447da61da9a07c4899de6ffbe64166a2476b11f0f19
-
Filesize
84KB
MD5aa1be9f021d85c53a925b08b20f13116
SHA1f8aae5cc5dc8f3b3d664309e0322caa64cc77a60
SHA256b7459f8e1019c45956af123953ac09e15fe1f34c2f2afabaffb1f9a8a4df9028
SHA512092b94b840f12d85c864422c355ecda6d4bcbef31c2903f098d0a2d4b7dc0a9a47a19a2817951296971ad447da61da9a07c4899de6ffbe64166a2476b11f0f19