Analysis
-
max time kernel
23s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 09:25
Behavioral task
behavioral1
Sample
9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe
Resource
win10v2004-20220812-en
General
-
Target
9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe
-
Size
71KB
-
MD5
2e9fbc06ef12c20cd50710715b28bcde
-
SHA1
4c6f2dbcffc312d8be5dc4a2a84e5402b6564200
-
SHA256
9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b
-
SHA512
5ae9b261468cfef7dd6b2e5cd5791c64a50e49f17ae288f4a445c681dbef8f6ff43a5bcb046e7bb47eec3189b50cfda34bbb94f172a5f58956739673d48b538c
-
SSDEEP
1536:7Exh3Qpt5ZAW4yoCp2ftFbMk+lkoODbos1rkdYthCX/3QQijs4GS5R:7O3QHrAlLCAfkbk3Dbos1rkGhuvQRQE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 932 TAEKMAN.exe -
Deletes itself 1 IoCs
pid Process 1528 cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\regedit.ico 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe File created C:\Windows\TAEKMAN.exe 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\ 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\ÊôÐÔ(&D)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell\ÊôÐÔ(&D)\Command 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell\Open(&O) 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O)\ = "Open(&O)" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DefaultIcon\ = "C:\\Windows\\regedit.ico" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\ÊôÐÔ(&D)\Command 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\ShellFolder 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell\Open(&O)\Command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE %1 h%t%t%p:%//%w%w%w.%zh%a%oi%e.%c%o%m" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\ 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DefaultIcon 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O) 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShellFolder 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\ShellFolder\Attributes = "10" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell\ÊôÐÔ(&D) 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell\Open(&O)\ = "Open(&O)" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\DefaultIcon 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell\Open(&O)\Command 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\ÊôÐÔ(&D) 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O)\Command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE " 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0} 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\ = "Internet Explorer" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\ShellFolder\Attributes = "10" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF98EB15-3044-6340-85B4-F6931B3A61A0}\Shell\ÊôÐÔ(&D)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O)\Command 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1340 wrote to memory of 932 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 28 PID 1340 wrote to memory of 932 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 28 PID 1340 wrote to memory of 932 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 28 PID 1340 wrote to memory of 932 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 28 PID 1340 wrote to memory of 932 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 28 PID 1340 wrote to memory of 932 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 28 PID 1340 wrote to memory of 932 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 28 PID 1340 wrote to memory of 1528 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 30 PID 1340 wrote to memory of 1528 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 30 PID 1340 wrote to memory of 1528 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 30 PID 1340 wrote to memory of 1528 1340 9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe"C:\Users\Admin\AppData\Local\Temp\9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\TAEKMAN.exe"C:\Windows\TAEKMAN.exe"2⤵
- Executes dropped EXE
PID:932
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\9fb77699ac34753ee2bb76e46cc1087a1b6f24447c6b93f0d8b7f2090f4c9b4b.exe"2⤵
- Deletes itself
PID:1528
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a526beece30f7c0288c60590808aef7d
SHA15458bcd3947bba076fd5bd6af6c6628048f6bbfb
SHA256f13140af92e2f09c56b0e91cbd56d53d4eebbe937deeace3939c4353073b1cd3
SHA5123678e1583c0203267f5af0dba0a2d928857f408d7223c9be75633b110a6159bb92fa0b1424d22fc62ee120d0bcd50eb655a6e1ced399bef55d25800c74b72feb
-
Filesize
4KB
MD5a526beece30f7c0288c60590808aef7d
SHA15458bcd3947bba076fd5bd6af6c6628048f6bbfb
SHA256f13140af92e2f09c56b0e91cbd56d53d4eebbe937deeace3939c4353073b1cd3
SHA5123678e1583c0203267f5af0dba0a2d928857f408d7223c9be75633b110a6159bb92fa0b1424d22fc62ee120d0bcd50eb655a6e1ced399bef55d25800c74b72feb