Analysis
-
max time kernel
180s -
max time network
219s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 15:49
Behavioral task
behavioral1
Sample
faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe
Resource
win10v2004-20220901-en
General
-
Target
faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe
-
Size
868KB
-
MD5
4166f9e9a0f80e9401c2f91fe234b22d
-
SHA1
13a4e86e40a8bb71bf31e20527645767c48a3af3
-
SHA256
faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221
-
SHA512
ff0122511b6f50a874fd24e51f04ec0d6d9ae2cec33c47ea86822030d4c0e20a2200254aa34afa11d666f502a485e10774a6618d9aff53d1df2a7a5f4c5eb7b9
-
SSDEEP
24576:HfCxC3da6K/67yhLYKE6I0pW26OlHlAInTXKNhL5:HgC3df6LYKM0pyOlF/TML5
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe -
resource yara_rule behavioral1/memory/1976-55-0x0000000000400000-0x0000000000610000-memory.dmp vmprotect behavioral1/memory/1976-58-0x0000000000400000-0x0000000000610000-memory.dmp vmprotect behavioral1/memory/1976-59-0x0000000000400000-0x0000000000610000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "115" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E2159A1-711E-11ED-85B0-EA20C184BE27} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376626027" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 868 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1976 faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe 1976 faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe 868 iexplore.exe 868 iexplore.exe 384 IEXPLORE.EXE 384 IEXPLORE.EXE 384 IEXPLORE.EXE 384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1976 wrote to memory of 868 1976 faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe 28 PID 1976 wrote to memory of 868 1976 faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe 28 PID 1976 wrote to memory of 868 1976 faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe 28 PID 1976 wrote to memory of 868 1976 faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe 28 PID 868 wrote to memory of 384 868 iexplore.exe 30 PID 868 wrote to memory of 384 868 iexplore.exe 30 PID 868 wrote to memory of 384 868 iexplore.exe 30 PID 868 wrote to memory of 384 868 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe"C:\Users\Admin\AppData\Local\Temp\faa5b2dfe60b26dc92b776285f5d968983cac8957381a3bf172ee0df5e47f221.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.tt336.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:384
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cbaf6f917f0e8c7623480de69561178d
SHA13fa33dff7cb619786874e7c2fec0ad3d81685ada
SHA2565c51e63bb52b3a10dd9a0a28b6e32290f2cc7ab2f8e389b117f37ce0cff2a7da
SHA51290d152095a9a420c41e1ae3965c7864eda773490432ea31c3cb225d3bc685999243d494e62f88e35f7e2ce4f04ebe94867af86e984e02a7e658630dd3a28e58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5b4fa459751b76e060f38afd61e8bda
SHA11247cfbff2c8d56b520ade9d5de3611432b5f415
SHA2569a49d790e6dc0f77a68b5e4fbc1686ab4fed83ab7b06eeb6021270580703dab0
SHA5125242c213c433fefdfb0ca4503f4dc518d5e7855e3673a11c0152cbdc1a5b0893c3c65d986e1b79771814b5c4f46607e2d1553fc2574241aad8b14bc1a62e9986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dbfd30d86060922b755683519761550a
SHA1c69cc1bb67850369f803857ed7849709b31d103f
SHA25661a53a318846fad0306df62618c0260e078341699f4bf386970daf969bbb3440
SHA5121124ff8ea21657bf794a8e0a5f58982ec0a2b548c1d95d5f6de86b7134952cf54fe08d79a7d87a0a341c238b6cd809f32f33d3decb616ca146acb205d18ffc68
-
Filesize
533B
MD573efa5c2dadf8cbbb30f23a3a8e9037e
SHA1c8bc26fbe4ebda7985938a2d736791b1621463f4
SHA256d034fbfa2301261c8991e4dfce8a5559782e032e4f1e4242d2cacda02f4272be
SHA51286a8a0cd01c0503e042f81a5760770f969704e8bf284fb7d36fc050d1887e62d7470655e0ec64025088a0bfc5adca2d96e26421b58aa1402900b5ea4f5c2049b