Analysis
-
max time kernel
307s -
max time network
321s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe
Resource
win10v2004-20221111-en
General
-
Target
67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe
-
Size
1.8MB
-
MD5
367ff4d02580f7ccb57cc48c3417df39
-
SHA1
f03ea2d4cf0bd061d3ea6d3412961b8f30394859
-
SHA256
67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0
-
SHA512
526a879d9554da5be1993ac3fa2273014e50005728c68bf1b338b30170163883e2216aa01d37910cbe7fcae1177f01d66317990b70f44704077a1decf36752da
-
SSDEEP
49152:fWtJIp4GlLfkUeUykN4WVXVVG88sSQvzSSO4IzN:f8yp4umUDrGmS2zvO40
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/204-132-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-135-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-134-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-137-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-136-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-139-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-141-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-143-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-145-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-147-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-149-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-151-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-153-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-155-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-157-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-159-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-161-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-163-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-165-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-167-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-169-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-171-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-173-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-175-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/204-177-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4592 204 WerFault.exe 79 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3668451546" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3668451546" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001544" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E548EF2F-77BB-11ED-B5DD-D2F35ABB710A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001544" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.dnf-ff.cccpan.com/" 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe Token: SeIncBasePriorityPrivilege 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe Token: 33 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe Token: SeIncBasePriorityPrivilege 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe 2924 iexplore.exe 2924 iexplore.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 204 wrote to memory of 2924 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe 80 PID 204 wrote to memory of 2924 204 67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe 80 PID 2924 wrote to memory of 4668 2924 iexplore.exe 84 PID 2924 wrote to memory of 4668 2924 iexplore.exe 84 PID 2924 wrote to memory of 4668 2924 iexplore.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe"C:\Users\Admin\AppData\Local\Temp\67b7a0508470620772bd460fc6a4aaf1dde2139ca63225f35ea25a7935b3c6a0.exe"1⤵
- Checks computer location settings
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://dnf-ff.cccpan.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:17410 /prefetch:23⤵PID:4668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 204 -s 13042⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 204 -ip 2041⤵PID:4828