Analysis
-
max time kernel
131s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 14:59
Static task
static1
Behavioral task
behavioral1
Sample
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe
Resource
win10v2004-20220812-en
General
-
Target
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe
-
Size
3.0MB
-
MD5
9c563c0b4bfbb5ae06cf7323e5974c4a
-
SHA1
a2b10fed37ccf6381a8ec55a008acef75f4fc5dd
-
SHA256
2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819
-
SHA512
094f11cf6e3d7301681cde5195c8e600fa4850ffdc131b370bfefba9222c57d81605b3852f40500838371dec5f1750a3e8979b73906cd91b97174b036588d9ad
-
SSDEEP
49152:fEoIlPFHG7xjp0g7nVY/ppd6CpgVuKv3lXYfy9/3Uq:879FHG7z0gcpL+usXYA/kq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3743262666" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3796387307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0335FD37-7111-11ED-AECB-D2A4FF929712} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376620326" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001e8d8dff21e8bd49853d311b8b2f199200000000020000000000106600000001000020000000937079835f25fb21dc6fb016def0bd7737ebee2ab177326feaa6449cc54af616000000000e8000000002000020000000b2d4f310bca2abaec29f072d69ced82682757bc3ee713c854c65f5a56958898620000000cea01f803bb32ffd0aefb41ea915a94c54be22bb3c6136f48db179607f5309fa400000008b4513c61cf9749c7eed390ad1c9db594c41167abd9197ac5478e070fa9bac76b59e85de15e0248c48f2e854506c2f88898546ca483dd803163648db526d9a72 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999837" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001e8d8dff21e8bd49853d311b8b2f19920000000002000000000010660000000100002000000093169593b0e1a93fc9df68b1a2d5ee3888970b3b0086d1aa7f35f960bd8149e6000000000e80000000020000200000004e6af1b1ba49f7a780ad1fa02320f095a9dbfb2d692fb489699703af893fd463200000001fe61eafba1e1fc0770b869496c83acb5895d59dc7de4bd4cc92d95adc11782c4000000084af0fd2f84a837cf91d72a6381d7c0cf5fb3fbfbf1adff76f1ee4288ed866b2079940fc5a4d76e29be3610b5426418a1ac8461affdf5a7766567f327d88fe85 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3743106168" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999837" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3796387307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1079b6f41d05d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706a30f21d05d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999837" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3480 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4572 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 4572 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 3480 iexplore.exe 3480 iexplore.exe 4660 IEXPLORE.EXE 4660 IEXPLORE.EXE 4660 IEXPLORE.EXE 4660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3480 4572 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 82 PID 4572 wrote to memory of 3480 4572 2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe 82 PID 3480 wrote to memory of 4660 3480 iexplore.exe 86 PID 3480 wrote to memory of 4660 3480 iexplore.exe 86 PID 3480 wrote to memory of 4660 3480 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe"C:\Users\Admin\AppData\Local\Temp\2a6f20f0749cb7fe7892e2835bcf5e37b6deadf115f2054cd58b54a8d7dc1819.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.30cf.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3480 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD57527fed2b73f5e0cd5ddcd033c0996a0
SHA1726f9a2f3e0e53e9a17eb103ba5833d17c53e7ae
SHA2566b7bc07984842c2e9794084d21fc948398dd5561a24d2cc70eb896c5ef2eaa18
SHA512b6f970794c7b689eb04de70c58eb5b1988f00289f2113b34e03f7d22961996293c1c990186b312d0633a1df5a8da210379ff00163c7e0af169f4814542f6944e