Analysis
-
max time kernel
174s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 08:46
Behavioral task
behavioral1
Sample
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe
Resource
win10v2004-20220812-en
General
-
Target
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe
-
Size
58KB
-
MD5
1de64e1cf2bda73ede782673333d0e70
-
SHA1
5854fff0080e6d800f4dfebd0612f0b14b923882
-
SHA256
4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4
-
SHA512
e66f07b9d2a16355f61b2e8992408b6f08c8156b135b07fd9dd5f8777f28dc577f1b2e60bdb0c7abb05d7760a53b9889f21fd581a8fbb7e480b3749ba8d4933a
-
SSDEEP
768:+Hf+S26Iyfvcse5kzId8rH7R1fkGhg2QiGPL6QNcD3fTOZXKhB0q:yIyfvdzId8j7MGyPOZzTO6B0q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1460 explore.exe -
resource yara_rule behavioral2/memory/4112-132-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4112-133-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x0006000000022e6e-135.dat upx behavioral2/files/0x0006000000022e6e-136.dat upx behavioral2/memory/1460-137-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1460-138-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explore = "\"C:\\Windows\\system32\\explore.exe\"" explore.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\explore.exe 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe File opened for modification C:\Windows\SysWOW64\explore.exe 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c117017519ca5d4291d4ef44a43af4ed00000000020000000000106600000001000020000000fec329985532f9bcfc721f221f9aa79046fdb298d3f86b90a94ee4cb36910114000000000e8000000002000020000000e3dc2f7be7616159bcdda80bfdac872e3e5ecb6935c9bc149602ea323b580ef62000000089caf943bf46092f465b2715f97281ebfa8be9d4a8951d7ab93aa555d96f71db4000000073c76536cc1bbbd6253f57843f3fdbefacf92a24a0902bd7ef2cba3847a92ea0be4dd9174e0164bbb6f4d40fa1dc0e49352704128675e5cea856eefe733ea6c3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07c50aa2b07d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304903a32b07d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2702566952" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2702566952" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000363" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000363" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c117017519ca5d4291d4ef44a43af4ed00000000020000000000106600000001000020000000d3ea1021952a3ea0f81cc5e038f9a59917e4a6ff62c0535119c738e66d3d0fec000000000e8000000002000020000000e58053347d89b8625fbffa11cab31d727ebe4e4dfbefc3f789126d71ea67bf7e200000003ff576ab1885e0ef47d9b2ee6d0194605f25cc14663d1eca6319237b0069a3ae40000000baa7791bc7ed585f99ba415096f8ded3f5be8af180972cc68a72473ef25a15e0a4ebc7e3fda6c0d7541e8054edfcf4299d0e4f47da6c8734c53376c103cb692d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CC64D363-731E-11ED-89AC-DA88DC7FA106} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4112 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe 4112 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe 1460 explore.exe 1460 explore.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 3964 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3964 iexplore.exe 3964 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1460 4112 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe 80 PID 4112 wrote to memory of 1460 4112 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe 80 PID 4112 wrote to memory of 1460 4112 4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe 80 PID 3964 wrote to memory of 2548 3964 iexplore.exe 83 PID 3964 wrote to memory of 2548 3964 iexplore.exe 83 PID 3964 wrote to memory of 2548 3964 iexplore.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe"C:\Users\Admin\AppData\Local\Temp\4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe" -UPD step3 C:\Users\Admin\AppData\Local\Temp\4b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4.exe|C:\Windows\system32\explore.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1548
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3964 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD51de64e1cf2bda73ede782673333d0e70
SHA15854fff0080e6d800f4dfebd0612f0b14b923882
SHA2564b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4
SHA512e66f07b9d2a16355f61b2e8992408b6f08c8156b135b07fd9dd5f8777f28dc577f1b2e60bdb0c7abb05d7760a53b9889f21fd581a8fbb7e480b3749ba8d4933a
-
Filesize
58KB
MD51de64e1cf2bda73ede782673333d0e70
SHA15854fff0080e6d800f4dfebd0612f0b14b923882
SHA2564b362a137f2a9759d152709b96db895cae84f0f96bfa747a374161d613e181c4
SHA512e66f07b9d2a16355f61b2e8992408b6f08c8156b135b07fd9dd5f8777f28dc577f1b2e60bdb0c7abb05d7760a53b9889f21fd581a8fbb7e480b3749ba8d4933a