Analysis
-
max time kernel
136s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 12:54
Behavioral task
behavioral1
Sample
d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe
Resource
win10v2004-20220901-en
General
-
Target
d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe
-
Size
21KB
-
MD5
ab08623461861158f4ca1d04dd6239c9
-
SHA1
10a79e2274cb8e2f9b9fae042c9f45103fb6f787
-
SHA256
d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981
-
SHA512
eb82a736e9e045fb4f7438881d4f6f8d510763d2e00a371e9c8a3bf5550e27af9488b48b4be379859f4b4300945d4ef91a2ef7d35d4d30de17c4c94ba834938e
-
SSDEEP
384:JVEi6d/zY7ez9sZQuUd5hCnMBDAebfLMYI1G1AxLr6+S9Pfu7n5v:JVEi6d7YTZQLdUMBDAebzMYUGuxydeVv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe -
Loads dropped DLL 1 IoCs
pid Process 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\UID = "a2e5560e6410000007bd8d65" d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1514057761" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000388" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000388" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1514057761" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1521558639" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000388" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376856757" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{85BD506C-7337-11ED-A0EE-C243EF799EB6} = "0" IEXPLORE.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\XML2 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\XML2\Script d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3900 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3900 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3900 IEXPLORE.EXE 3900 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1376 wrote to memory of 4196 1376 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 82 PID 1376 wrote to memory of 4196 1376 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 82 PID 1376 wrote to memory of 4196 1376 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 82 PID 4196 wrote to memory of 3900 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 83 PID 4196 wrote to memory of 3900 4196 d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe 83 PID 3900 wrote to memory of 632 3900 IEXPLORE.EXE 84 PID 3900 wrote to memory of 632 3900 IEXPLORE.EXE 84 PID 3900 wrote to memory of 632 3900 IEXPLORE.EXE 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe"C:\Users\Admin\AppData\Local\Temp\d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe"C:\Users\Admin\AppData\Local\Temp\d5e4cc2b9385a98a8168bc607c1bc64e53ccfa71b9c7e94b940cb83f7a20d981.exe"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3900 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:632
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD50ff2da8bfc83bec6bce38ba6a3f7bf58
SHA184c37df7bed08d69f040c289676735c49a9564eb
SHA25691026f24711c435d99a44884c7239ed1265cd17c0259a6c5885f69e4309421ea
SHA51278afdc44d7557b2f14444182085252e8456c91289511d6f2abfd1d7273d05baba9a94206d370add716b9fc30dc326a1a2e1c78f642e926759d962cf216c3a489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD50cd44f74fe4e2bf307cd2f6adf598c63
SHA152a0f96b25e3407d90ad2e8fbae5ac82bccbc4ec
SHA25655bd40ab72b5ebbb4bc85b4a01f73cf4d5ff55df3613dffdc1211581d808e703
SHA5126444a4868fbe969f74dedb4d770d819e812af1ddbed8b6fccb0930f42da83ff025c90ea8f7848e2c5cc632338a8baa28220d1de50fab7aafadc2103de23f9c26
-
Filesize
26KB
MD519da423603964c137036759ba65b26a4
SHA19a759d8e318733ef7809a921b1dea64d5f3c0faa
SHA25689938a90d3897493229195a753afb316750220b495fca6e5ef0ddfb1596b6604
SHA5124f27cb129f8e6d09e2ac1f79e2fda6001e92de146174556719937e7820e902490913d577742c91f4caea225ba90ee0815c9044436f69b9fc7926a6bef0b67fe7