Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 01:15
Static task
static1
Behavioral task
behavioral1
Sample
7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe
Resource
win10v2004-20220812-en
General
-
Target
7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe
-
Size
437KB
-
MD5
d305c00acc4cd962dfd2ab69c3d9fbda
-
SHA1
adf57e2f7555badf5467c127e138de49a58cfb2b
-
SHA256
7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d
-
SHA512
a8eb88507e124fa66fa1cb420e69c86b45f584f8f55281d25d9daf3b33017e06effcf5ea17421b6990d48107617cc0cd2dc3eda6786128b5f68efe808d6ecc01
-
SSDEEP
6144:FCOoWSuTpRMgDtvAP+2PqdAdeF54hFNE9cZQ5XR7nyHOshfXR7nyHOsh:FyuTpRJvAP7ydAdeohxQ5ByusdByus
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
WORM.EXE.EXEZXZ.EXEsvchost.exepid process 1728 WORM.EXE.EXE 956 ZXZ.EXE 1648 svchost.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba4c12bee3027d94da5c81db2d196bfd.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba4c12bee3027d94da5c81db2d196bfd.exe svchost.exe -
Loads dropped DLL 3 IoCs
Processes:
7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exeZXZ.EXEpid process 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe 956 ZXZ.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ba4c12bee3027d94da5c81db2d196bfd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ba4c12bee3027d94da5c81db2d196bfd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" .." svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BABB631-719A-11ED-9916-DE5CC620A9B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a69883133e09cd4da10b63ec009ae3d2000000000200000000001066000000010000200000002c3daca8da6a963fcfd670101fe85181eec64924ebd6ae859c06955c97394676000000000e800000000200002000000045c3699041f75217a347f629b08af5e80d0df71746e28408731529ed7e4594df20000000add2fc1ca563029b441d02737e2aa8fb3440603e75a31d290ce279a6b711cc24400000000ec2f663647ed38cc14659dc08b95a70e61d1ce542143d0767df7775d94c970ff3315c75fe058433fff81f8b569c83bd44c0f42cca7497904982578e8454e2d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376679385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d7a46ca705d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
svchost.exepid process 1648 svchost.exe 1648 svchost.exe 1648 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 1648 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 436 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 436 iexplore.exe 436 iexplore.exe 240 IEXPLORE.EXE 240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exeZXZ.EXEsvchost.exeWORM.EXE.EXEiexplore.exedescription pid process target process PID 1132 wrote to memory of 1728 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe WORM.EXE.EXE PID 1132 wrote to memory of 1728 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe WORM.EXE.EXE PID 1132 wrote to memory of 1728 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe WORM.EXE.EXE PID 1132 wrote to memory of 1728 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe WORM.EXE.EXE PID 1132 wrote to memory of 956 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe ZXZ.EXE PID 1132 wrote to memory of 956 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe ZXZ.EXE PID 1132 wrote to memory of 956 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe ZXZ.EXE PID 1132 wrote to memory of 956 1132 7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe ZXZ.EXE PID 956 wrote to memory of 1648 956 ZXZ.EXE svchost.exe PID 956 wrote to memory of 1648 956 ZXZ.EXE svchost.exe PID 956 wrote to memory of 1648 956 ZXZ.EXE svchost.exe PID 956 wrote to memory of 1648 956 ZXZ.EXE svchost.exe PID 1648 wrote to memory of 1784 1648 svchost.exe netsh.exe PID 1648 wrote to memory of 1784 1648 svchost.exe netsh.exe PID 1648 wrote to memory of 1784 1648 svchost.exe netsh.exe PID 1648 wrote to memory of 1784 1648 svchost.exe netsh.exe PID 1728 wrote to memory of 436 1728 WORM.EXE.EXE iexplore.exe PID 1728 wrote to memory of 436 1728 WORM.EXE.EXE iexplore.exe PID 1728 wrote to memory of 436 1728 WORM.EXE.EXE iexplore.exe PID 1728 wrote to memory of 436 1728 WORM.EXE.EXE iexplore.exe PID 436 wrote to memory of 240 436 iexplore.exe IEXPLORE.EXE PID 436 wrote to memory of 240 436 iexplore.exe IEXPLORE.EXE PID 436 wrote to memory of 240 436 iexplore.exe IEXPLORE.EXE PID 436 wrote to memory of 240 436 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe"C:\Users\Admin\AppData\Local\Temp\7a4e2dff7aee5b415be14e733547e34d9f8b9357433e821b171791a4e213937d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WORM.EXE.EXE"C:\Users\Admin\AppData\Local\Temp\WORM.EXE.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=WORM.EXE.EXE&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:436 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\ZXZ.EXE"C:\Users\Admin\AppData\Local\Temp\ZXZ.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE4⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WORM.EXE.EXEFilesize
224KB
MD5c32a647e5267d256d848afeef2fec541
SHA17804edc0904f221bc775245956132044a45ae3f4
SHA256f233c11d12b0636c53fee2c068af95d4a20a184e560820a226bfc803bde740e3
SHA51224dacb9a901cbaa13395669ae1cb572fd31abca07287c74094fd4f5e37144bfa7ec6abd79b758b13910b7b5583832f3b92a37dbdf34e32e09df60a521ff40362
-
C:\Users\Admin\AppData\Local\Temp\WORM.EXE.EXEFilesize
224KB
MD5c32a647e5267d256d848afeef2fec541
SHA17804edc0904f221bc775245956132044a45ae3f4
SHA256f233c11d12b0636c53fee2c068af95d4a20a184e560820a226bfc803bde740e3
SHA51224dacb9a901cbaa13395669ae1cb572fd31abca07287c74094fd4f5e37144bfa7ec6abd79b758b13910b7b5583832f3b92a37dbdf34e32e09df60a521ff40362
-
C:\Users\Admin\AppData\Local\Temp\ZXZ.EXEFilesize
129KB
MD56d016b4211d51618831cff6d5a142783
SHA1b98898da9e032320a3e38541d5f54de6bd34cbfa
SHA256607efe27b04897f879dd7646b9acb30434b3550abba5da5ea1ce0393c15c1e8b
SHA512c3be048092df8f6f6872673adc8422ade38d58df2d01fb2447bf3b5cc6eb1d7d2539d3cf24a7140b01b06d9bb550e866e8542b5bfd662462a7e952a5a876f639
-
C:\Users\Admin\AppData\Local\Temp\ZXZ.EXEFilesize
129KB
MD56d016b4211d51618831cff6d5a142783
SHA1b98898da9e032320a3e38541d5f54de6bd34cbfa
SHA256607efe27b04897f879dd7646b9acb30434b3550abba5da5ea1ce0393c15c1e8b
SHA512c3be048092df8f6f6872673adc8422ade38d58df2d01fb2447bf3b5cc6eb1d7d2539d3cf24a7140b01b06d9bb550e866e8542b5bfd662462a7e952a5a876f639
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
129KB
MD56d016b4211d51618831cff6d5a142783
SHA1b98898da9e032320a3e38541d5f54de6bd34cbfa
SHA256607efe27b04897f879dd7646b9acb30434b3550abba5da5ea1ce0393c15c1e8b
SHA512c3be048092df8f6f6872673adc8422ade38d58df2d01fb2447bf3b5cc6eb1d7d2539d3cf24a7140b01b06d9bb550e866e8542b5bfd662462a7e952a5a876f639
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
129KB
MD56d016b4211d51618831cff6d5a142783
SHA1b98898da9e032320a3e38541d5f54de6bd34cbfa
SHA256607efe27b04897f879dd7646b9acb30434b3550abba5da5ea1ce0393c15c1e8b
SHA512c3be048092df8f6f6872673adc8422ade38d58df2d01fb2447bf3b5cc6eb1d7d2539d3cf24a7140b01b06d9bb550e866e8542b5bfd662462a7e952a5a876f639
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5K6P7NAJ.txtFilesize
539B
MD559b5967606959da9857c7c5657857b4e
SHA123f9fafb5d9b7bcff69bfef1fd85c59e348aeeb0
SHA256ce5d65ec729c7c02c12cc4ef42377d223a96322afdf32f54da1163222aaa1e74
SHA512aadddbbc5a4d8df755e4fd81ab560bb9586f4fa6e3281474e0e8cb946cf25d978134de20f152e5542fab6aba544f8827d8ed1031a126141e6afbfcb461194fee
-
\Users\Admin\AppData\Local\Temp\WORM.EXE.EXEFilesize
224KB
MD5c32a647e5267d256d848afeef2fec541
SHA17804edc0904f221bc775245956132044a45ae3f4
SHA256f233c11d12b0636c53fee2c068af95d4a20a184e560820a226bfc803bde740e3
SHA51224dacb9a901cbaa13395669ae1cb572fd31abca07287c74094fd4f5e37144bfa7ec6abd79b758b13910b7b5583832f3b92a37dbdf34e32e09df60a521ff40362
-
\Users\Admin\AppData\Local\Temp\ZXZ.EXEFilesize
129KB
MD56d016b4211d51618831cff6d5a142783
SHA1b98898da9e032320a3e38541d5f54de6bd34cbfa
SHA256607efe27b04897f879dd7646b9acb30434b3550abba5da5ea1ce0393c15c1e8b
SHA512c3be048092df8f6f6872673adc8422ade38d58df2d01fb2447bf3b5cc6eb1d7d2539d3cf24a7140b01b06d9bb550e866e8542b5bfd662462a7e952a5a876f639
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
129KB
MD56d016b4211d51618831cff6d5a142783
SHA1b98898da9e032320a3e38541d5f54de6bd34cbfa
SHA256607efe27b04897f879dd7646b9acb30434b3550abba5da5ea1ce0393c15c1e8b
SHA512c3be048092df8f6f6872673adc8422ade38d58df2d01fb2447bf3b5cc6eb1d7d2539d3cf24a7140b01b06d9bb550e866e8542b5bfd662462a7e952a5a876f639
-
memory/956-59-0x0000000000000000-mapping.dmp
-
memory/956-70-0x0000000074200000-0x00000000747AB000-memory.dmpFilesize
5.7MB
-
memory/1132-54-0x0000000075931000-0x0000000075933000-memory.dmpFilesize
8KB
-
memory/1648-66-0x0000000000000000-mapping.dmp
-
memory/1648-74-0x0000000074200000-0x00000000747AB000-memory.dmpFilesize
5.7MB
-
memory/1648-76-0x0000000074200000-0x00000000747AB000-memory.dmpFilesize
5.7MB
-
memory/1728-71-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/1728-75-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/1728-56-0x0000000000000000-mapping.dmp
-
memory/1784-72-0x0000000000000000-mapping.dmp