Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 22:25
Static task
static1
Behavioral task
behavioral1
Sample
bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe
Resource
win7-20220812-en
General
-
Target
bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe
-
Size
129KB
-
MD5
58e764f7fa9066c9eec521fa7db92f57
-
SHA1
13578991b07b0e53de52431fb75eb99350e67f66
-
SHA256
bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7
-
SHA512
63d4b1ecac68603602ffd9d8126b721bf5defb6177abaa828a54d99ec585e3a827652293f160a1127e1b18c5d91c6808f4e584bc02e050fb5e36049e1e95faab
-
SSDEEP
3072:jy4BK0IpOCTmMaenUY6N2VDGqoih77y7egP:e4DIpOCTmMaenG2VyqZh72B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4928 snss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TM.lnk snss.exe -
Loads dropped DLL 1 IoCs
pid Process 4560 Regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\NoExplorer = "1" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01443AEC-0FD1-40fd-9C87-E93D1494C233} Regsvr32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\csys.dat snss.exe File opened for modification C:\Windows\SysWOW64\Thunder.dll bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe File created C:\Windows\SysWOW64\sysini.ini bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe File opened for modification C:\Windows\SysWOW64\sysini.ini snss.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\snss.exe bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe File opened for modification C:\Program Files (x86)\Internet Explorer\bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper\CLSID\ = "{01443AEC-0FD1-40fd-9C87-E93D1494C233}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\VersionIndependentProgID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper.1 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper.1\ = "xlhelper Class" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper.1\CLSID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\ = "Thunder 1.0 Type Library" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\ = "Ixlhelper" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\InprocServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\Thunder.dll" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\ProxyStubClsid32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\ = "Ixlhelper" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7C849754-C410-455A-842E-75DBCBD222B6} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper\CLSID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\Programmable Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\FLAGS\ = "0" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\HELPDIR\ = "C:\\Windows\\system32" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\TypeLib Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\ProgID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\InprocServer32\ = "C:\\Windows\\SysWow64\\Thunder.dll" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\FLAGS Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\0\win32 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\ProxyStubClsid32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\TypeLib Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper.1\CLSID\ = "{01443AEC-0FD1-40fd-9C87-E93D1494C233}" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper\ = "xlhelper Class" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\TypeLib Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\0 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\VersionIndependentProgID\ = "Thunder.xlhelper" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\TypeLib\ = "{87CA3845-37FE-414C-81CF-E08A7D0F6779}" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\TypeLib\Version = "1.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper\CurVer Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87CA3845-37FE-414C-81CF-E08A7D0F6779}\1.0\HELPDIR Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\TypeLib\ = "{87CA3845-37FE-414C-81CF-E08A7D0F6779}" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C849754-C410-455A-842E-75DBCBD222B6} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7C849754-C410-455A-842E-75DBCBD222B6}\TypeLib\Version = "1.0" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Thunder.xlhelper\CurVer\ = "Thunder.xlhelper.1" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\ = "xlhelper Class" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\ProgID\ = "Thunder.xlhelper.1" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{01443AEC-0FD1-40fd-9C87-E93D1494C233}\TypeLib\ = "{87CA3845-37FE-414C-81CF-E08A7D0F6779}" Regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 4928 snss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4928 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 82 PID 1676 wrote to memory of 4928 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 82 PID 1676 wrote to memory of 4928 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 82 PID 1676 wrote to memory of 4560 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 83 PID 1676 wrote to memory of 4560 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 83 PID 1676 wrote to memory of 4560 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 83 PID 1676 wrote to memory of 5000 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 87 PID 1676 wrote to memory of 5000 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 87 PID 1676 wrote to memory of 5000 1676 bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe"C:\Users\Admin\AppData\Local\Temp\bee6cd2ae7802f88b3681ca54e888a2f242bfa44cb85848473eb31beabe051d7.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\snss.exe"C:\Program Files (x86)\snss.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s "C:\Windows\system32\Thunder.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\123.bat" "2⤵PID:5000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD54adf885cadefc467ae0a80d22ac39dde
SHA1db68bda85b74c4481a0b2a8ca3caec537113b592
SHA256357584d6d05f000bfc50842ebe43c73ad01c8e0d3089276157f284d2b6ed7b7f
SHA512c69845030c8a74766ed29feadd849ea3bbdadf02c11b8e8304f751c01caf793ebbbf941dde155f38656c9c0c68d5209e1a88a6ea64855bf54e98d103b5eadf31
-
Filesize
41KB
MD54adf885cadefc467ae0a80d22ac39dde
SHA1db68bda85b74c4481a0b2a8ca3caec537113b592
SHA256357584d6d05f000bfc50842ebe43c73ad01c8e0d3089276157f284d2b6ed7b7f
SHA512c69845030c8a74766ed29feadd849ea3bbdadf02c11b8e8304f751c01caf793ebbbf941dde155f38656c9c0c68d5209e1a88a6ea64855bf54e98d103b5eadf31
-
Filesize
318B
MD59099f156b19fd71eb3a6bea77c6713a8
SHA176b92f334b8f705bba2fc1114af4fbbf482c6799
SHA25636868901aa90602f8517b10fc5f97b625b06c11226ebe62e4464d7cb81f09808
SHA5128156fecb7ab380dcc3fb087ee9222df532020e9e824fa2dfd937098bae1b337dc60da5dba7c3330918c1efa2c8af66e73be6e46a32452bbf4c903ffbdcccc5d2
-
Filesize
32KB
MD5a7caa79b09af67825cb17c5fb55d928e
SHA121ca5640c0c655f67839a7e78c2475fabd5f5ac4
SHA2564edfb01c890866133f6f8f21d5a0eee4a290f9853e83b719bc8b506fcc7b5c07
SHA51208aabcc3571ae8eaaede340e857f5597026c93e381abeb85d59835359876af88a9490d8e337e4243ea24a58bc4940797c0fec35c974fda9dbc40ce549e02884c
-
Filesize
32KB
MD5a7caa79b09af67825cb17c5fb55d928e
SHA121ca5640c0c655f67839a7e78c2475fabd5f5ac4
SHA2564edfb01c890866133f6f8f21d5a0eee4a290f9853e83b719bc8b506fcc7b5c07
SHA51208aabcc3571ae8eaaede340e857f5597026c93e381abeb85d59835359876af88a9490d8e337e4243ea24a58bc4940797c0fec35c974fda9dbc40ce549e02884c
-
Filesize
1KB
MD5f29f9b2e040a39c3898c6f834ff38ccc
SHA12b188cd05813587d53fab5db47ae4d2e1a126008
SHA256333582423f8f0c2bc8a22116e6805b3ab667c0ba3055138edc359408a097b012
SHA512ef45f4c1a00598f30ad233a25dbbf478430ee70ca1a9d6e2f35435bc5c006fa70855ef68ec0f06dd0791f8987a7af157d759bc4d2a2705d5b4aed3958c02d9c7