Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 10:29
Behavioral task
behavioral1
Sample
2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe
Resource
win10v2004-20220901-en
General
-
Target
2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe
-
Size
1.2MB
-
MD5
e148b8ce66c584f5e9affb47808e251b
-
SHA1
d95fd0e36af4db7b5d5745cf4718bbbd8fb0a229
-
SHA256
2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642
-
SHA512
25ec6b47f66c32a982a5e9c94e5a4edacc79bdeec326afb064a9055b5d94fc03a2ffee74c2c3166d48d0062419d12f9f225b559fb9139ad4b1fcbe9599ffe357
-
SSDEEP
24576:eAU8WGNi0q2pom+uFjECaOiuz2PAelzwOi/8Lg+w49:edLOiYpom+xO3aPAufi0k949
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1388-55-0x0000000000400000-0x00000000006F3000-memory.dmp vmprotect behavioral1/memory/1388-57-0x0000000000400000-0x00000000006F3000-memory.dmp vmprotect behavioral1/memory/1388-58-0x0000000000400000-0x00000000006F3000-memory.dmp vmprotect behavioral1/memory/1388-60-0x0000000000400000-0x00000000006F3000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\cfdami.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cfdami.com\ = "126" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\cfdami.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\cfdami.com\Total = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cfdami.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376856347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90C15151-7336-11ED-B51C-6E705F4A26E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\cfdami.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.cfdami.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 932 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1208 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 1208 iexplore.exe 1208 iexplore.exe 932 IEXPLORE.EXE 932 IEXPLORE.EXE 932 IEXPLORE.EXE 932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1208 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 28 PID 1388 wrote to memory of 1208 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 28 PID 1388 wrote to memory of 1208 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 28 PID 1388 wrote to memory of 1208 1388 2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe 28 PID 1208 wrote to memory of 932 1208 iexplore.exe 29 PID 1208 wrote to memory of 932 1208 iexplore.exe 29 PID 1208 wrote to memory of 932 1208 iexplore.exe 29 PID 1208 wrote to memory of 932 1208 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe"C:\Users\Admin\AppData\Local\Temp\2bfe66f919a246a58c4caf60606c0b612cfed819fa4dacedc6d0eab0fc392642.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.cfdami.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize1KB
MD58461b627fd0e03a19c0066e408ea7046
SHA1799fe8fc1b7cd1e9b361bc29eb53d22ac4650f22
SHA2563cfe7bdbfc30c77d71caba0bb759ffb0c37c243f89ff5de9352fb37a2d977ba7
SHA5122d965a4516e87529eb3ed7bcb366e1b42711b1fee840a2b3679a4298ccbdb5634f4f5c2fdfc23db41e297fa01d153f5014bcdbd184088f27c41c4877134fe04d
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize1KB
MD5d86cf35a26124ae08e55ac69af81f731
SHA11e994d462214513215c67eb0add6f802d45cdf75
SHA256518676fc168473baef2b229a75b14d56a0cd9792ef33a3cf89da972ebb34412d
SHA512d930e566caa14faff75ec5f4fc89bcca868345c6c9cae7152c38b9da97380c9e7c3c8f9b81cbaac2ef4b56168bbfe70c3a287e153a454d6c6aa2fbb1d9b66390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B
Filesize508B
MD5daa0c5ed18f74d20eef43cec7c1ead45
SHA1a83214684f94260e695f59561a5f9b1175387feb
SHA256a0cb4b6c47826dbb3c8a5a387dd91ff36faa3c709dc16d7a8afad20f8187d899
SHA51242dd47fde188d99901cd006f14302135373ea22647f2a9ad64b708bfe5d18c4658d3f68a0211812c62b1ff02934356995723a07be90f319870b173e85273478c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD55d3249e43579c478b44654f82ef15477
SHA1ab70003cb8ca7ee6d14f2941ff4fd21128cdc89b
SHA25646dbd677d532a41c4840b671831533a283e3439b649a7caf39b2f382e893dc92
SHA512da55ce2f429d4c5dd0ec9fdd7aa45592df6e120edb38d83324d8aeb487bebc59859d8ad01ccb4c5c8a6080c012be50594c75b1e89a8cdb5059a995fcea080227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3ecc58dc16807fdedd18ae9d309ab8
SHA16c13ad5c07ed56be156ae4eb414e725da3352b8f
SHA256b4dbce9050ce77ef01b43564bcd4d99b06027720c285058f0e406f2ceaef54f6
SHA51214bd9237c39fcacbb2c8feea4e75869ed75dc6d384e6ab9ba05931fdc7e72af7a3e5dbbd45c7e1911303f487f9f88ca7723c19dafd2555404a2ccfa32e00f949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3
Filesize506B
MD567b150977e6ef327a37232aeaf4eb4ab
SHA1bca2516ff610e5f0ac03fd855a5030c8855290d4
SHA256c7d53603cfe5dd255dcd7b46ff371868e3be2824423efdb7f465c0285a8890a8
SHA5126e1d7f7347a4377c0858c78111578a2fb822b740ee45896244acb0ccc75e064c977ca521cc58394c603520fe6853f6e5d8eb1ca65613cccf05059c88731f49b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\I1MOMV2H.htm
Filesize278KB
MD5f2b97a8421e99c2b060bd0113cb79084
SHA101e193c6c8578080640b83458c3e26ac8a73f568
SHA25644c664ac76cc2c5d6ba3d1dcaa78d288d43bc49989f67eb0f614b136112ae05b
SHA512a70473fdfdf0fbb73f170a14cf54c1c48341e3a810a03a8c45478726cc478293332fcc7f0fd74572f1a34363089cae5d990afc254d40d2db9ba08662dec99ec9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LYNQJM7\white2[1].css
Filesize1KB
MD520b0aa3ba2ba814c7e6d16cfa19f3d28
SHA166428ca19ddbcd34ddba1e22717ff26c8fc2098e
SHA2569ba6eac6d8c0da502ad2ff2726acbebac161863c838f6e5eb85f155d8ce59c61
SHA51225c5b27bd74b314c1b8aff6329bedc4554d49ac0bc384f5f2c0c5ca128df847f994c8dee8a7a7bc24fafea9185be4b8d22e452592161925a3289a4491a11fdf8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\bootstrap-bbs[1].css
Filesize4KB
MD5af896d79fbfee84a11f7ea3e5811ebb8
SHA1e870488f5bbbe2c907eceab5181adf9a967fc54d
SHA25609a11164df7bfca613e7f00974a4bc29c6765af87298b1123bb52d772da4a3b5
SHA512ffa26440c3cbf73183e71d5eff39de795a583473d73f86a76316165c0df42d29612a066e4ab980b17953e43950a9164a79acf22c15dd7341192d7e5870a83853
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MK8YK3QV\bootstrap[1].css
Filesize192KB
MD562c5cae7f6038a90bbe57e32aaae70a0
SHA13b19f0b7bd0f794165f66a848d372a04d3251f0b
SHA256b603a4827ca9917237f14d021d0f1c374177e7dac008e932cd95a074ac7b2a8e
SHA5128ccf6943a44e03b5abcb8cde4431e8af8a24d528f928fae72e81f9ea536490aef5ec4e829428138eef34cacafc17f767f2d5bbd2daca0e75b3a9e63301fb551d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V881MODH\plus[1].css
Filesize557B
MD598969d45be2375d31e56549207f2dba7
SHA1047b707c97319e4ae9889331fa610ca5ee182ab9
SHA2564501a0dbfe5408c669c62796c5977ae80caa445993141d25d60df4105cfd6be0
SHA512751432570a7594235bfb25f55acfca114942999cd6e4239a54bad33532aa9c3ed4d8dbbbcc255b9e163b02bdb0392955c191c5f3c9e04b0d5a0b53373dc70943
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\av[1].css
Filesize36KB
MD58f93e03614406339f94a0ddd7eaebb71
SHA1e3869dbb4eee4a24de5f809cdf5306c42489cdea
SHA256c2558ba8391736bd7237bce938e11c60750ac34a61c19a68dcbb15ce3bf14dea
SHA512ab14a7ab5aad319b1f90555f9240fabf39dc77e145b85b56ef2da38f81982fc129f287adb46d5ec86d86be804d0d45d14612781199f6443566cafc6bdf5e6352
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WRZXZATJ\white[1].css
Filesize23KB
MD5055b01513eb588878e38199f0dcbae23
SHA1461dccc4dd29409f8d7cc84fb065d043b18d064f
SHA2567b65663be6cfa0f90450fed32a1afa2f987cd8e0fa53759f42a15c9db538a76f
SHA5120119a27877349e427d680e81fc230edc5e98b4d2e914f951932eaf0d3e5e6b4171247122341dd6a25490a14e67315d5caa1ed23332068dd7404b79a6f9cbe93c
-
Filesize
606B
MD5d7e711682aaef22abbb5f4b2f75f69a9
SHA197a78dee64c36fc82646604bd38b04d836b51b63
SHA256f563ecd9584f3d6c807e3800348891f9102a275875d9e54a9ebc3e8689340c1a
SHA512fb7881b63accbfb92deb6ee5493d81b45b805bb3a2e5d4a520b4ffc6edf964609719428501a1b60a0115bfb83f71020c448ddc3d1e3eebd3548f402ae0b3758a