Analysis
-
max time kernel
176s -
max time network
216s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 21:39
Behavioral task
behavioral1
Sample
c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe
Resource
win10v2004-20220812-en
General
-
Target
c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe
-
Size
548KB
-
MD5
5f2f7997119dd02598845d308fb6a192
-
SHA1
ff03f107c9fb06f019ccded3c4e5f89e9fd12d82
-
SHA256
c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57
-
SHA512
050fc68d9f91780031a3fd59872d9d823b4469db3fdd87482a3305c5fbca96ec0751a382973115abdff877dd477d8f65909c254d3b1820b847d16202305035ef
-
SSDEEP
12288:YR9yH6k71WH7GPk/lh1DWBJvJQouAPx9L+jr1abpmbcVNM8Ox:gMFQHh//VWBx+APmjr1UEcs8Ox
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2036-54-0x0000000000400000-0x00000000005D9000-memory.dmp upx behavioral1/memory/2036-56-0x0000000000400000-0x00000000005D9000-memory.dmp upx behavioral1/memory/2036-58-0x0000000000400000-0x00000000005D9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E77235C0-7861-11ED-A80F-CA7A4AEEC1E8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004d28c16e0cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377424719" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af0000000002000000000010660000000100002000000005e0f97fb64c9accb1394915c8a1ca9d5a950051cdcabf7af77940a82d8741e3000000000e8000000002000020000000efa0439125d58cd16fe69e6c57b7470a651d22d3352dd1cea981b818d3bf71ca20000000063d8e4aed44fa38ed4e01bccb84524f9c7520fcde8587229805f60f9136df45400000008845696d92d2a7ae4e34fbcdb639f489317097177aea78eb099aa4e2e994f0b68cdadcc43300774807eb278d665576a139b6572df74f2a18fcbc8bb44fbfe9db iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 932 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 932 iexplore.exe 932 iexplore.exe 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 932 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 30 PID 2036 wrote to memory of 932 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 30 PID 2036 wrote to memory of 932 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 30 PID 2036 wrote to memory of 932 2036 c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe 30 PID 932 wrote to memory of 432 932 iexplore.exe 31 PID 932 wrote to memory of 432 932 iexplore.exe 31 PID 932 wrote to memory of 432 932 iexplore.exe 31 PID 932 wrote to memory of 432 932 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe"C:\Users\Admin\AppData\Local\Temp\c48d72641deb844c54239fc1e17f59b672aa7c2e3f6ad71f52d4fbb4cea44b57.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.cfxiaomi.com/?wg2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:932 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:432
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD52bfe3faea84d590a345bc38052063f56
SHA17f175e0bcb1b335750adf493ce7efb79cb771dbb
SHA256d1d51b2e54e013e96ffbec6e31536c8165f3968dc04821714f5902d0c1b85fb3
SHA512076f3d11c337e1ec0bf12d9a4d062d8f012a99a74c5bbdae3491680d8545d8c802b9b345d5e9ac4fa661383206b45f3d32062eff6c57329887e446b5233f2171