Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe
Resource
win10v2004-20220901-en
General
-
Target
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe
-
Size
753KB
-
MD5
00a90283c4144f91cca88110d9808370
-
SHA1
4cbbf3515062b6f8fb2f1ac80919b8251d3a6681
-
SHA256
3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
-
SHA512
6b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
SSDEEP
12288:UvfVxc9RYwqS+G2WGyq5CQsUjfzdm4hf1cV/7Fj9pLxzcoCa0VTgB2g+S0lbT:UvNxc9R/qSv2WGF5JsUrcJVpZlxYoCau
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000300000000072d-133.dat acprotect behavioral2/files/0x000300000000072d-140.dat acprotect behavioral2/files/0x000300000000072d-139.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 4752 Aonzreurn.exe -
resource yara_rule behavioral2/files/0x000300000000072d-133.dat upx behavioral2/files/0x000300000000072d-140.dat upx behavioral2/files/0x000300000000072d-139.dat upx behavioral2/memory/2404-144-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/4752-146-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/2404-153-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/4752-155-0x0000000010000000-0x0000000010129000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 4752 Aonzreurn.exe 4752 Aonzreurn.exe 4752 Aonzreurn.exe 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\d4f3d7c8e03ea3459f720e9aca547dda.dat Aonzreurn.exe File opened for modification C:\Windows\Fonts\d4f3d7c8e03ea3459f720e9aca547dda.dat Aonzreurn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Aonzreurn.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000341" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376836435" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Aonzreurn.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "NO" Aonzreurn.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{347D35A3-7308-11ED-A0EE-D2F2753F5017} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000341" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "149965507" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "149965507" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000341" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "160278144" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4752 Aonzreurn.exe 4752 Aonzreurn.exe 4752 Aonzreurn.exe 4752 Aonzreurn.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2784 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 4752 Aonzreurn.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2404 wrote to memory of 4752 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 84 PID 2404 wrote to memory of 4752 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 84 PID 2404 wrote to memory of 4752 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 84 PID 4752 wrote to memory of 2784 4752 Aonzreurn.exe 85 PID 4752 wrote to memory of 2784 4752 Aonzreurn.exe 85 PID 2404 wrote to memory of 2096 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 86 PID 2404 wrote to memory of 2096 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 86 PID 2404 wrote to memory of 2096 2404 3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe 86 PID 2784 wrote to memory of 208 2784 IEXPLORE.EXE 88 PID 2784 wrote to memory of 208 2784 IEXPLORE.EXE 88 PID 2784 wrote to memory of 208 2784 IEXPLORE.EXE 88 PID 4752 wrote to memory of 2784 4752 Aonzreurn.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe"C:\Users\Admin\AppData\Local\Temp\3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\ProgramData\Aonzreurn.exeC:\ProgramData\Aonzreurn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer Automatic Crash Recovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:208
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""c:\3f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0.exe_And DeleteMe.bat""2⤵PID:2096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753KB
MD500a90283c4144f91cca88110d9808370
SHA14cbbf3515062b6f8fb2f1ac80919b8251d3a6681
SHA2563f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
SHA5126b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
Filesize
753KB
MD500a90283c4144f91cca88110d9808370
SHA14cbbf3515062b6f8fb2f1ac80919b8251d3a6681
SHA2563f2cb0f3257efde57f2a77caad7bb27701ab53a948a757a0a8e1a34f4f0f1ad0
SHA5126b6394940ac4d8ba21f12dd6ba4043245695263a089f3f4405a860d6b855831d198a064ba12562312d4df486260323da4c84e6248f18fdfc51a462ea5af06ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD50ff2da8bfc83bec6bce38ba6a3f7bf58
SHA184c37df7bed08d69f040c289676735c49a9564eb
SHA25691026f24711c435d99a44884c7239ed1265cd17c0259a6c5885f69e4309421ea
SHA51278afdc44d7557b2f14444182085252e8456c91289511d6f2abfd1d7273d05baba9a94206d370add716b9fc30dc326a1a2e1c78f642e926759d962cf216c3a489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD53443dee33f488bc7f04066b0c5a253e6
SHA112f0bccd61853db14988eeeb5e151ace867252e6
SHA256298c4b7b6d5adcb6f43a8223e6103985c67026d6a4ccfc03e827aaf7b3dff852
SHA5125da5cafe7610119e6ab6ee4b1d38a6f01f6949d13ad349d77aa6a199294ae54e5dc378ff34a2adba30717d9cced76e58f34fadd86f27b2ae41fdabe166de0aa2
-
Filesize
72KB
MD5f79ee77a4f30401507e6f54a61598f58
SHA17f3ef4945f621ed2880ff5a10a126957b2011a17
SHA256cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8
SHA51226ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
408KB
MD57567ba52775aa0a1a9b88d873479bd56
SHA1d0e93b703c23cd77a1ac02bdaa496a0f9095cf61
SHA2564ed9f5cefdd2be5427dbb94b41d8eb679a1fd9c2660d93721d06c16bb96cd5e8
SHA51292eaf0809aecd11a9c508f47e04df531509ffad709109151c6c8bbcc825d24f2b726aff148b4034d49202ca499d87cccc275fcfaf9882b774d2d735e6c774d2e
-
Filesize
408KB
MD57567ba52775aa0a1a9b88d873479bd56
SHA1d0e93b703c23cd77a1ac02bdaa496a0f9095cf61
SHA2564ed9f5cefdd2be5427dbb94b41d8eb679a1fd9c2660d93721d06c16bb96cd5e8
SHA51292eaf0809aecd11a9c508f47e04df531509ffad709109151c6c8bbcc825d24f2b726aff148b4034d49202ca499d87cccc275fcfaf9882b774d2d735e6c774d2e
-
Filesize
408KB
MD57567ba52775aa0a1a9b88d873479bd56
SHA1d0e93b703c23cd77a1ac02bdaa496a0f9095cf61
SHA2564ed9f5cefdd2be5427dbb94b41d8eb679a1fd9c2660d93721d06c16bb96cd5e8
SHA51292eaf0809aecd11a9c508f47e04df531509ffad709109151c6c8bbcc825d24f2b726aff148b4034d49202ca499d87cccc275fcfaf9882b774d2d735e6c774d2e
-
Filesize
246B
MD50e4bb083d165943b0e3f1a5bbbfcf59d
SHA1f1cb4f56a2d6540777d52ef43d701804a17762b7
SHA2566f0845b7baeb3974af4fba8eca52c009824dce7c0c4fad49f93e6c3b551974d2
SHA51254dcd916c55aed741685228523700bfb59d0637a86d7d775ac03606af187276cb3a3a576aad498b6f9ac0d4b633cb86d3c57a2cfd456597b14f9a56c2488787f