Analysis
-
max time kernel
165s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe
Resource
win10v2004-20221111-en
General
-
Target
c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe
-
Size
28KB
-
MD5
41acbc53cc5025b10a8b047bf711b635
-
SHA1
5b76c16bc2a8c03a1c6c7383aed17eca2735a136
-
SHA256
c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5
-
SHA512
e54cdc100fc5d949df12345570b27c9ba2aed0a3805ca8c65611b1af828942641cf779e903185c09ddf9fe6528cd4db830768f925173f0568df034b9b5400237
-
SSDEEP
192:/TkSOk/g2haj2Nkx5hJxKQraXcn9W3kYkfYM2sSexj73:/TkSw2cj6knhHFraMn9WDrM2sSyj73
Malware Config
Signatures
-
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\syslogn = "C:\\WINDOWS\\system32\\userinit.exe,c:\\windows\\syslogn.exe" c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1224 c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 916 1224 c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe 28 PID 1224 wrote to memory of 916 1224 c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe 28 PID 1224 wrote to memory of 916 1224 c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe 28 PID 1224 wrote to memory of 916 1224 c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe"C:\Users\Admin\AppData\Local\Temp\c4412089deda66e6b302a014368301c2dbd6a3be89930c490712a51bb25792e5.exe"1⤵
- Modifies WinLogon
- Drops autorun.inf file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\2⤵PID:916
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1692