Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe
Resource
win10v2004-20221111-en
General
-
Target
86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe
-
Size
346KB
-
MD5
0f34cb1f25ba4b48360fd98b7cab5a10
-
SHA1
93de67f7ac7ebb72b801c7c098bb59f29a7a8fce
-
SHA256
86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8
-
SHA512
70b052db42277dd3e743243157fe8c4d1bc40aa32092338f7302ccf0e5bb6ed25c7c71f02afe0ae67744ce43b05378edd3e029be42573cb79abc7d0b4ec27ed0
-
SSDEEP
6144:ye34e5MvlhNC7JuyKAs8LG9R3HNe76JvML/9c7Cr7Ob+FT:ny+YyXSvi2v2ICvOb+FT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1540 installstat.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation cscript.exe -
Loads dropped DLL 4 IoCs
pid Process 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 1540 installstat.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\EditPlus\kk37.icw 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377122303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A1967E81-75A1-11ED-BF5F-7EADEF22860F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb00000000020000000000106600000001000020000000bcf4dc6a56be63fd93861aef37f0d16c7f1e1dd47644ff841936f3d0f8d9c613000000000e800000000200002000000006b86dde6cc184675b0eb41dc7f511b832d347effe84823313f6ec31e18631c1200000003e6cb5faa3e0fb550f3387a16cc69721c956562078655c4d58ef1242f9c6af694000000043f57db179d73635e7c3e5d3dc80c70d4bb2bc92a271d14adf8d5a4e7b022c34048a87d428771c9eef73100dbf5a8b733b8a2a13ba9126369dcd6cdac327d96a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb00000000020000000000106600000001000020000000a46b7b705160bd89c95433e31e0dd23535403a3548765c35a652b9827cbfe4eb000000000e8000000002000020000000a957e00f910be167e733014d675d586dc4ec8a4c41b4156828b1313251003920200000003d6a387dc73da1ce58c1ed32395433c9b8d301fcd8abdadf3ec18f87a00314db400000008a31209e7927ca05f441f33a0349f873b566f78f14b7e40f613fb6b05b5a98fee73e3b556acf1dbdde9bf0518b0f822bfe59999ecf04e4513dd0aa89f2641546 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d4889dae09d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bf7a8aae09d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine\ = "VBScript" 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\ = "´ò¿ª(&O)" 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "icwfile" 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4056 iexplore.exe 4056 iexplore.exe 3672 IEXPLORE.EXE 3672 IEXPLORE.EXE 3672 IEXPLORE.EXE 3672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2972 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 84 PID 1332 wrote to memory of 2972 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 84 PID 1332 wrote to memory of 2972 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 84 PID 2972 wrote to memory of 216 2972 cscript.exe 86 PID 2972 wrote to memory of 216 2972 cscript.exe 86 PID 2972 wrote to memory of 216 2972 cscript.exe 86 PID 1332 wrote to memory of 1540 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 88 PID 1332 wrote to memory of 1540 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 88 PID 1332 wrote to memory of 1540 1332 86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe 88 PID 4056 wrote to memory of 3672 4056 iexplore.exe 90 PID 4056 wrote to memory of 3672 4056 iexplore.exe 90 PID 4056 wrote to memory of 3672 4056 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe"C:\Users\Admin\AppData\Local\Temp\86f757ab1d66de240d7f09c93046dfeb8606966ed0c2425e5bb6eb2faf74bfd8.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk37.icw"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk37.icw"3⤵PID:216
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1540
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2324
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4056 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD52c105f3c5da6702374835cf5d390700d
SHA1cce2cc2cde133df4772446886acafac5042fe9c0
SHA256033154bd33107aea0a6b0755584d2a047c4b201f51a7134929dff05eeff1e8c9
SHA512505718bab301903a75540c28b1e2a54f18e15fb0267770b7a6f986f5bdb62a7e1c6511dd987c23f2ea978be3541a80fc4ffd7a71b6fe4a51a06b1d401eea93f0
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
840B
MD5669a1a6d8d3c2d7dd22c513bb4ea9f2f
SHA1c009a8caceeeda334d7bbad63b79b68635ff5b6d
SHA256aeb3c5fba20401f514bb270132a380aabcec600d8d7e8a69469a17df5e11a7b1
SHA51208db47ef0811b8072db6ed8514637f97b7fa65d4dd67da5f5c2c496c8963c02fa3a09d6874811c65a681bc6d9a531495e36bf5b05dcd75484694f40e5c054ce6
-
Filesize
80KB
MD55be4eb5fdadec491b400154856934411
SHA108fe0f77953b2f9551f31b866af1979abf17fb76
SHA2564fe92016750ab429662870c03966c4cc0b8f2c9e179daa17a05298d0fb5d4dc8
SHA512d42369fa74df36433b807c025b8214984ba24ca77ab38946664b8b2017f9e5383b83751744c1ffb716206470e832fab72ca24ae8cf2808250af86afef742ce90
-
Filesize
80KB
MD55be4eb5fdadec491b400154856934411
SHA108fe0f77953b2f9551f31b866af1979abf17fb76
SHA2564fe92016750ab429662870c03966c4cc0b8f2c9e179daa17a05298d0fb5d4dc8
SHA512d42369fa74df36433b807c025b8214984ba24ca77ab38946664b8b2017f9e5383b83751744c1ffb716206470e832fab72ca24ae8cf2808250af86afef742ce90