Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe
Resource
win10v2004-20220812-en
General
-
Target
a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe
-
Size
108KB
-
MD5
74b4bb3c6d40bb60f1827410e175bc84
-
SHA1
a48ecf758da486ec66374aef2620fd182c6583a4
-
SHA256
a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6
-
SHA512
6fb3bcf5a0145908d330a111311a49c528d1a1d2c95ec9c4e1aed9271fbf1421f53ca0468452ec72f1ee157744eca9bed47f522c3b50bf4acb94d0a3f9f6dd46
-
SSDEEP
1536:ZXbgU0nlmm8oh+ct4aXASg5VmXzGkV/0uNuucotd04Z9KQh1INjcyLHpRtMjf8bN:aU0nf1h+c+SMmakOuBcqnuU1IB9LJrN
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winpar32.rom,roYXwed" a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winpar32.rom a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe File opened for modification C:\Windows\SysWOW64\winpar32.rom a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 280 1960 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1649281-77CB-11ED-8DB1-7A3897842414} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377360316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1388 iexplore.exe 1388 iexplore.exe 1264 IEXPLORE.EXE 1264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1360 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 28 PID 1960 wrote to memory of 1360 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 28 PID 1960 wrote to memory of 1360 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 28 PID 1960 wrote to memory of 1360 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 28 PID 1360 wrote to memory of 1388 1360 cmd.exe 30 PID 1360 wrote to memory of 1388 1360 cmd.exe 30 PID 1360 wrote to memory of 1388 1360 cmd.exe 30 PID 1360 wrote to memory of 1388 1360 cmd.exe 30 PID 1388 wrote to memory of 1264 1388 iexplore.exe 32 PID 1388 wrote to memory of 1264 1388 iexplore.exe 32 PID 1388 wrote to memory of 1264 1388 iexplore.exe 32 PID 1388 wrote to memory of 1264 1388 iexplore.exe 32 PID 1960 wrote to memory of 1388 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 30 PID 1960 wrote to memory of 1388 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 30 PID 1960 wrote to memory of 1796 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 34 PID 1960 wrote to memory of 1796 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 34 PID 1960 wrote to memory of 1796 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 34 PID 1960 wrote to memory of 1796 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 34 PID 1960 wrote to memory of 280 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 35 PID 1960 wrote to memory of 280 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 35 PID 1960 wrote to memory of 280 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 35 PID 1960 wrote to memory of 280 1960 a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe"C:\Users\Admin\AppData\Local\Temp\a8b8014bcbc58710fecd9a9c4c4b20cd68db4a3fd36ef171723fc84be8899dc6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\oOuF5B5.bat"2⤵PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 1522⤵
- Program crash
PID:280
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD59a13669e77d6c0a77ba89af239fe1247
SHA1125e521264de0858d96d299922d1093c5f8cf298
SHA25679be52ed123dae7fab8f12ea3ded61eadbaa09ff155bb2156e815a0c541b2245
SHA5127e3b1e88d0e9928757ba6b43a35a370d8aaecbdffb9635e1c9b77235b1fea85e901c4f720b4a65ca335151040bcfd0a923a6938cfa9692493b94eadd2f9dbc48
-
Filesize
71KB
MD53649a07fe15c43855270f62fbac9da97
SHA1b71522b10f7d75552b975ac2cf21d0440ddcdf52
SHA256096f30d7198ab655049186453874938912f1c26e8ec227c930424af14c09c350
SHA512886cefc7438b7193842cee880eb916baa6a138dc9920d7c723d4102aa675be3d1548aff537cb7679338fdce75a4f94ac562b5d92280dcfe90c3d9063325e8876
-
Filesize
603B
MD529fc5ba6445e7fabec67826296c79375
SHA1b7ef0d423c9e2da1578388823a44bafeef0fa449
SHA2560883ba0f9a0a2cc52b3c1fcc8360a0e85274bd186eeed44c7eca25dcde232a3c
SHA512bed05d4573703b3a65fccb9a86179f59b97ccb6199cd2d4dbb8ccb6a6084226f1962fe95e51dac0b384fc77c1839a802d0f945bc8472793fede98db3d3de0b97
-
Filesize
71KB
MD53649a07fe15c43855270f62fbac9da97
SHA1b71522b10f7d75552b975ac2cf21d0440ddcdf52
SHA256096f30d7198ab655049186453874938912f1c26e8ec227c930424af14c09c350
SHA512886cefc7438b7193842cee880eb916baa6a138dc9920d7c723d4102aa675be3d1548aff537cb7679338fdce75a4f94ac562b5d92280dcfe90c3d9063325e8876