Analysis
-
max time kernel
115s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe
Resource
win10v2004-20220901-en
General
-
Target
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe
-
Size
753KB
-
MD5
00a90283c4144f91cca88110d9808370
-
SHA1
4cbbf3515062b6f8fb2f1ac80919b8251d3a6681
-
SHA256
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
-
SHA512
6b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
SSDEEP
12288:UvfVxc9RYwqS+G2WGyq5CQsUjfzdm4hf1cV/7Fj9pLxzcoCa0VTgB2g+S0lbT:UvNxc9R/qSv2WGF5JsUrcJVpZlxYoCau
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a00000001232d-54.dat acprotect behavioral1/files/0x000a00000001232d-64.dat acprotect behavioral1/files/0x000a00000001232d-63.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1600 Aonzreurn.exe -
resource yara_rule behavioral1/files/0x000a00000001232d-54.dat upx behavioral1/files/0x000a00000001232d-64.dat upx behavioral1/files/0x000a00000001232d-63.dat upx behavioral1/memory/1628-69-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/1600-72-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/1628-77-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/1600-79-0x0000000010000000-0x0000000010129000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1328 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 1600 Aonzreurn.exe 1600 Aonzreurn.exe 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\d4f3d7c8e03ea3459f720e9aca547dda.dat Aonzreurn.exe File opened for modification C:\Windows\Fonts\d4f3d7c8e03ea3459f720e9aca547dda.dat Aonzreurn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Aonzreurn.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0EDC971-7310-11ED-8589-FE63F52BA449} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" Aonzreurn.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376840080" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Aonzreurn.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1600 Aonzreurn.exe 1600 Aonzreurn.exe 1600 Aonzreurn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 1600 Aonzreurn.exe 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1600 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 28 PID 1628 wrote to memory of 1600 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 28 PID 1628 wrote to memory of 1600 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 28 PID 1628 wrote to memory of 1600 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 28 PID 1600 wrote to memory of 1048 1600 Aonzreurn.exe 29 PID 1600 wrote to memory of 1048 1600 Aonzreurn.exe 29 PID 1600 wrote to memory of 1048 1600 Aonzreurn.exe 29 PID 1600 wrote to memory of 1048 1600 Aonzreurn.exe 29 PID 1628 wrote to memory of 1328 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 31 PID 1628 wrote to memory of 1328 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 31 PID 1628 wrote to memory of 1328 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 31 PID 1628 wrote to memory of 1328 1628 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 31 PID 1048 wrote to memory of 1656 1048 IEXPLORE.EXE 33 PID 1048 wrote to memory of 1656 1048 IEXPLORE.EXE 33 PID 1048 wrote to memory of 1656 1048 IEXPLORE.EXE 33 PID 1048 wrote to memory of 1656 1048 IEXPLORE.EXE 33 PID 1600 wrote to memory of 1048 1600 Aonzreurn.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe"C:\Users\Admin\AppData\Local\Temp\3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\ProgramData\Aonzreurn.exeC:\ProgramData\Aonzreurn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer Automatic Crash Recovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""c:\3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe_And DeleteMe.bat""2⤵
- Deletes itself
PID:1328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753KB
MD500a90283c4144f91cca88110d9808370
SHA14cbbf3515062b6f8fb2f1ac80919b8251d3a6681
SHA2563f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
SHA5126b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
Filesize
753KB
MD500a90283c4144f91cca88110d9808370
SHA14cbbf3515062b6f8fb2f1ac80919b8251d3a6681
SHA2563f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
SHA5126b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
Filesize
72KB
MD5f79ee77a4f30401507e6f54a61598f58
SHA17f3ef4945f621ed2880ff5a10a126957b2011a17
SHA256cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8
SHA51226ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
408KB
MD57567ba52775aa0a1a9b88d873479bd56
SHA1d0e93b703c23cd77a1ac02bdaa496a0f9095cf61
SHA2564ed9f5cefdd2be5427dbb94b41d8eb679a1fd9c2660d93721d06c16bb96cd5e8
SHA51292eaf0809aecd11a9c508f47e04df531509ffad709109151c6c8bbcc825d24f2b726aff148b4034d49202ca499d87cccc275fcfaf9882b774d2d735e6c774d2e
-
Filesize
539B
MD5b5789ecbdac16468958bcadd71e61327
SHA1b2efa0602a5083ab32eccaeefacdb1d378521032
SHA256873df940d24e6282925e3b881b7b5c105f6b1f4f0ee0d620932ec308af3266a4
SHA512999aed05dcff4dac1a7e6db8e8afb67e42000eeda9d4c3f73fb763175fd380c79b060384d2c4cb8e46e61562f449f296ee5eefffeb1d7c1a5bf29e114f0ed827
-
Filesize
246B
MD50e4bb083d165943b0e3f1a5bbbfcf59d
SHA1f1cb4f56a2d6540777d52ef43d701804a17762b7
SHA2566f0845b7baeb3974af4fba8eca52c009824dce7c0c4fad49f93e6c3b551974d2
SHA51254dcd916c55aed741685228523700bfb59d0637a86d7d775ac03606af187276cb3a3a576aad498b6f9ac0d4b633cb86d3c57a2cfd456597b14f9a56c2488787f
-
Filesize
753KB
MD500a90283c4144f91cca88110d9808370
SHA14cbbf3515062b6f8fb2f1ac80919b8251d3a6681
SHA2563f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
SHA5126b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
Filesize
753KB
MD500a90283c4144f91cca88110d9808370
SHA14cbbf3515062b6f8fb2f1ac80919b8251d3a6681
SHA2563f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
SHA5126b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
408KB
MD57567ba52775aa0a1a9b88d873479bd56
SHA1d0e93b703c23cd77a1ac02bdaa496a0f9095cf61
SHA2564ed9f5cefdd2be5427dbb94b41d8eb679a1fd9c2660d93721d06c16bb96cd5e8
SHA51292eaf0809aecd11a9c508f47e04df531509ffad709109151c6c8bbcc825d24f2b726aff148b4034d49202ca499d87cccc275fcfaf9882b774d2d735e6c774d2e
-
Filesize
408KB
MD57567ba52775aa0a1a9b88d873479bd56
SHA1d0e93b703c23cd77a1ac02bdaa496a0f9095cf61
SHA2564ed9f5cefdd2be5427dbb94b41d8eb679a1fd9c2660d93721d06c16bb96cd5e8
SHA51292eaf0809aecd11a9c508f47e04df531509ffad709109151c6c8bbcc825d24f2b726aff148b4034d49202ca499d87cccc275fcfaf9882b774d2d735e6c774d2e