Analysis
-
max time kernel
151s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 14:59
Static task
static1
Behavioral task
behavioral1
Sample
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe
Resource
win10v2004-20220812-en
General
-
Target
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe
-
Size
3.0MB
-
MD5
9c563c0b4bfbb5ae06cf7323e5974c4a
-
SHA1
a2b10fed37ccf6381a8ec55a008acef75f4fc5dd
-
SHA256
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819
-
SHA512
094f11cf6e3d7301681cde5195c8e600fa4850ffdc131b370bfefba9222c57d81605b3852f40500838371dec5f1750a3e8979b73906cd91b97174b036588d9ad
-
SSDEEP
49152:fEoIlPFHG7xjp0g7nVY/ppd6CpgVuKv3lXYfy9/3Uq:879FHG7z0gcpL+usXYA/kq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000d6a24077bea13a3886f64e584059a4ea81afeb84efbf35a11da221960b54b816000000000e8000000002000020000000afe1662ebf696cc9506c282011d145c70390cbb357e1ec4330620e75d55b81952000000070acca327293fbb2f7388d5ddc80fdf2aae6daeb0d82bc6e4b12d8a08f12d9f740000000e24dd3433dd01fd53abe96269b931437b646120d6ee82fe97d6033fc23a33b46099c95dee95fefeb9dbcd84842a36b2e84bc64af94647f2ddbbe1994171c4402 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405b231b1e05d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376620406" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{395B1A81-7111-11ED-B8AC-EED7317926BC} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1368 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1524 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 952 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 952 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 1524 iexplore.exe 1524 iexplore.exe 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 952 wrote to memory of 1524 952 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 30 PID 952 wrote to memory of 1524 952 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 30 PID 952 wrote to memory of 1524 952 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 30 PID 952 wrote to memory of 1524 952 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 30 PID 1524 wrote to memory of 1368 1524 iexplore.exe 31 PID 1524 wrote to memory of 1368 1524 iexplore.exe 31 PID 1524 wrote to memory of 1368 1524 iexplore.exe 31 PID 1524 wrote to memory of 1368 1524 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe"C:\Users\Admin\AppData\Local\Temp\2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.30cf.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1524 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5768e2b151ee7538feb29dd56742f6437
SHA1f8e595ad8cd41e9c1c261bad9676b8f5133e7d3d
SHA256c4ca93e069bc357cab4cc861967b80ba901646659eb5e03e8a8cb867615c389e
SHA5129f15eb04ddf971e81660d4fc0b24e330be8e87fcc6b86ec729c3cb8fed971b76f8ff92043614827de742a5d246980d4f67b69f824b05189649c6f56a751133a3
-
Filesize
533B
MD53dd2110aad337d4f5243661af6f6128f
SHA1a6910af5fb624e289b47766d0f90243ab57680bd
SHA2566e121a47bdb17ab69b3532bf6c04e17dbc3f9ec3ce59386cfe521547e6cd8ea4
SHA51235b7f664074089f833e95751a9b44700ce054ad030bd21d753c79d6274a8b3731a93f5dea7602d72ed0434bb954fd0e868f13a35658534277d8b56dc454d072d