Analysis
-
max time kernel
283s -
max time network
348s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 07:49
Behavioral task
behavioral1
Sample
3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe
Resource
win10v2004-20221111-en
General
-
Target
3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe
-
Size
976KB
-
MD5
71601c8490badece74029f2b31671ccd
-
SHA1
0c75b680ae839dadbe653d35a1224cb583e0c574
-
SHA256
3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd
-
SHA512
5988b094496dbb2c8fb1539ff9f3af88aa169f630f54bcd98aabd034b4c36b5a9674c2d75e47e23a4d8684e41c7c8ed6781d626a6042cf2f64e2db87b460ef0e
-
SSDEEP
24576:H5Y2vFzsngsE7KXMFpeZX0xtwFWzSLjJSoNl:Ha2vFonsOX2EX0xtwFWzSXIoN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4428-132-0x0000000000400000-0x000000000072B000-memory.dmp vmprotect behavioral2/memory/4428-133-0x0000000000400000-0x000000000072B000-memory.dmp vmprotect behavioral2/memory/4428-134-0x0000000000400000-0x000000000072B000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D4AAF599-77B4-11ED-B5DD-DE991C57DA8F} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4428 3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe 4428 3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe 4428 3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe 4428 3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe 3124 iexplore.exe 3124 iexplore.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4428 wrote to memory of 3124 4428 3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe 81 PID 4428 wrote to memory of 3124 4428 3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe 81 PID 3124 wrote to memory of 2540 3124 iexplore.exe 86 PID 3124 wrote to memory of 2540 3124 iexplore.exe 86 PID 3124 wrote to memory of 2540 3124 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe"C:\Users\Admin\AppData\Local\Temp\3aa7a34f44a8a34a8aa8c014daea369a00e03b16469fee718ce9d34d419012cd.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.dnfann.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3124 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
PID:2540
-
-