Analysis
-
max time kernel
148s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 17:16
Static task
static1
Behavioral task
behavioral1
Sample
1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe
Resource
win10v2004-20221111-en
General
-
Target
1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe
-
Size
456KB
-
MD5
826940dcb269552bc7fc14fac7adf5df
-
SHA1
be7956b1baad5e54e9f9df9efbc8ed0f23bcbaad
-
SHA256
1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9
-
SHA512
252550fc4f0202086b67dfa148cbbd35d48deb177cb2188c7fca6debc73a76da6e11fa2d3d7e8fcd5ceadfb9daec7bc639edc9b137da9c97262daccbd8544dfa
-
SSDEEP
12288:dy/vD028/618D4ODwVc2flmIQfWHV6Tg7lsftzTNBV4D:s/o28CzYXVV66osftzTNBV4D
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\explore.exe\" Set" 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe -
Executes dropped EXE 1 IoCs
pid Process 588 explore.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UltraSurf992.exe 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UltraSurf992.exe 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe -
Loads dropped DLL 2 IoCs
pid Process 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main explore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 588 explore.exe 588 explore.exe 588 explore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1428 wrote to memory of 588 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 28 PID 1428 wrote to memory of 588 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 28 PID 1428 wrote to memory of 588 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 28 PID 1428 wrote to memory of 588 1428 1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe"C:\Users\Admin\AppData\Local\Temp\1e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\explore.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\explore.exe Set2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5826940dcb269552bc7fc14fac7adf5df
SHA1be7956b1baad5e54e9f9df9efbc8ed0f23bcbaad
SHA2561e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9
SHA512252550fc4f0202086b67dfa148cbbd35d48deb177cb2188c7fca6debc73a76da6e11fa2d3d7e8fcd5ceadfb9daec7bc639edc9b137da9c97262daccbd8544dfa
-
Filesize
456KB
MD5826940dcb269552bc7fc14fac7adf5df
SHA1be7956b1baad5e54e9f9df9efbc8ed0f23bcbaad
SHA2561e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9
SHA512252550fc4f0202086b67dfa148cbbd35d48deb177cb2188c7fca6debc73a76da6e11fa2d3d7e8fcd5ceadfb9daec7bc639edc9b137da9c97262daccbd8544dfa
-
Filesize
456KB
MD5826940dcb269552bc7fc14fac7adf5df
SHA1be7956b1baad5e54e9f9df9efbc8ed0f23bcbaad
SHA2561e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9
SHA512252550fc4f0202086b67dfa148cbbd35d48deb177cb2188c7fca6debc73a76da6e11fa2d3d7e8fcd5ceadfb9daec7bc639edc9b137da9c97262daccbd8544dfa
-
Filesize
456KB
MD5826940dcb269552bc7fc14fac7adf5df
SHA1be7956b1baad5e54e9f9df9efbc8ed0f23bcbaad
SHA2561e4669ba8f87c91793f8c9f345033ca74f9ccb3ca717382731e99ead576392c9
SHA512252550fc4f0202086b67dfa148cbbd35d48deb177cb2188c7fca6debc73a76da6e11fa2d3d7e8fcd5ceadfb9daec7bc639edc9b137da9c97262daccbd8544dfa