Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 22:31
Behavioral task
behavioral1
Sample
83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe
Resource
win10v2004-20220812-en
General
-
Target
83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe
-
Size
248KB
-
MD5
3622b5e3f088529473c3f0776ea752c7
-
SHA1
5c78ba90f3a719af8ab5d83c7d843a14730136ec
-
SHA256
83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2
-
SHA512
89573c225300bc976b47415c381abbd7508143ce0a916d48467fcbe81a3a504a9d0feaaefe593f02fc551424663fc8318c95e5ce8b65ea4db0904c2ebcebf16c
-
SSDEEP
3072:/4ejDxjrUBmb6CfVMiU1RV+e07z8/doNBO+qhx8giwWoutpMJ5r:/djDpU46CfVfgzH0P8/+NBOB+wWoS0r
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2920-132-0x00000000000C0000-0x0000000000100000-memory.dmp upx behavioral2/memory/2920-133-0x00000000000C0000-0x0000000000100000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1bdb3b4bca9aff6bda0bd = "C:\\Users\\Admin\\AppData\\Roaming\\ldqw.exe" 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2920 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe 2920 83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe"C:\Users\Admin\AppData\Local\Temp\83512ba14d852e05f2f986640be3b6428c6f6bee6383c22a75df5db455d0bde2.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2920