Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 11:57
Static task
static1
Behavioral task
behavioral1
Sample
1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe
Resource
win10v2004-20220812-en
General
-
Target
1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe
-
Size
498KB
-
MD5
924d243aebf0620998596bcfcb8f2719
-
SHA1
60fedf9235cc9a3ed798007d2c68d4234b4d7f76
-
SHA256
1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004
-
SHA512
083ab4125296716915838fc94fa38826ea01c001a5d89d3bbd134c1fcf9bfc92699701b5f6161ab6f6a6c6f3fc0b078785f8bcdc752dc316e266a7739a391847
-
SSDEEP
12288:F95O9mv22T+8hWku8YexMbIMIcbyhvkQzyM5iT3:NOGhyaqbD5byxpj5iT3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376740283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000025c5b9ce8d6f3e40b634686c826fcd92000000000200000000001066000000010000200000008db215b7273ce217e135fba6e4d9410455f1add35699631a16776805af0695d8000000000e8000000002000020000000c8f6782ff9398d1d1681213a75607bf40962b3436479305ac0d3922a76eaa8bf20000000fe868aa72657fc6f77efae71fc84c578829114b2517454125096264c1429e8a1400000004409f25515170d8b2e8a9c27c878f694abff9d5207040b20e3408353b6c8236328ab6af1df9221255b0d6ad0e219c79e4eeee46f634821ffc81867f27d6fac8b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609b55663506d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51F11DC1-7228-11ED-9C7C-660C31E8D015} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 912 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exeiexplore.exeIEXPLORE.EXEpid process 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe 912 iexplore.exe 912 iexplore.exe 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exeiexplore.exedescription pid process target process PID 1032 wrote to memory of 912 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe iexplore.exe PID 1032 wrote to memory of 912 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe iexplore.exe PID 1032 wrote to memory of 912 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe iexplore.exe PID 1032 wrote to memory of 912 1032 1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe iexplore.exe PID 912 wrote to memory of 1304 912 iexplore.exe IEXPLORE.EXE PID 912 wrote to memory of 1304 912 iexplore.exe IEXPLORE.EXE PID 912 wrote to memory of 1304 912 iexplore.exe IEXPLORE.EXE PID 912 wrote to memory of 1304 912 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe"C:\Users\Admin\AppData\Local\Temp\1ce8d2a541c912c0a782e8d027444a91505675136a651a7e2b14f473623ac004.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.5yaoyx.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:912 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD53795e654a79246623207e3165fa52afe
SHA1090658fdcc890024254d3742583f86af3302144c
SHA2560e593f7391794b4ef049541aa0079f7aa11bf9def20e058954b620f23ad99c05
SHA512a62a7288f9c53ea05898c1bdc322bda28ce7adc5e6be3f89f4c762c464873df359365fd30a0d5f1345c500b937227b6fadc35476a08d02856eff55233aa08f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5d50726db2a0954a6b00e0d71492d4d7f
SHA14014ee3094128a0cffd9087842d9ede64bc6de4f
SHA25618096021c4bbfe94618e75760580b550de61e940a71ceafd311f38888715d1f4
SHA512028f1058f3c9d90f5390370af6c27571d0ce0662ef2a91de6434d3776c540ef61342e735a950dd7cdc2097bc305fdbf08c72e3a3ad621b436b77a001653e1029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD5cef74144af05b8d9009ba3200ad87454
SHA198b423fe371d76eae110926c19fc5249ddb84c48
SHA256cac0f7d5a7b2ba9084ce722058a14d9cab43a2ab4e1d984b5fb142bdfc4a16b3
SHA5122b9d16d61704da0b467f6784f6021f44b34bea5c2414cff51f4f51f18c19af19974f2ca4267ff7d092ec4cee2415bc573fd9538ebb54e103bb89b05e71327a95
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5XQJT6LE.txtFilesize
608B
MD54c6b4df3c1af9e9bcd39fa780f18f729
SHA1438ed33a238aa7f40f37df82612a4f1cb3902987
SHA2567e528b2934866ad3e69a6f248a23f955d1a364fc9692214f0101f68c0dddfe37
SHA5122a4f658df9044f180da863a5882613d8ed74ca7cccb6763114845dcfefb46eadec79ce263093d1d059c71307faa07e47480d6bdbad61289196dace697f70f7e1
-
memory/1032-54-0x0000000076711000-0x0000000076713000-memory.dmpFilesize
8KB
-
memory/1032-55-0x0000000000400000-0x0000000000546000-memory.dmpFilesize
1.3MB
-
memory/1032-56-0x0000000000400000-0x0000000000546000-memory.dmpFilesize
1.3MB