Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe
Resource
win10v2004-20221111-en
General
-
Target
a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe
-
Size
69KB
-
MD5
268171181d88cf3cacf18078d1366a00
-
SHA1
eea95617c94b191506cf37ca85e2b5064cf6215f
-
SHA256
a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0
-
SHA512
025caa53938e52b8710542776433737c1929bc100c33af778b83ef1f01ea22f9063fb1e2f8153f73ade8bdbab55f3892022bbf26ccd4e1e7dbdc05bf9115041c
-
SSDEEP
1536:LFcpB4OEQDN9ZTGX7rOMw2XGXjDsNEwHYVrOttUBrD:LQBscNDGrrOzzD1mYpMqB3
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winxuj32.rom,zKukPXaV" a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winxuj32.rom a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe File opened for modification C:\Windows\SysWOW64\winxuj32.rom a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1416 576 WerFault.exe 25 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D9CA4B1-77D4-11ED-977F-FAF5FAF3A79A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377363857" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 620 IEXPLORE.EXE 620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 576 wrote to memory of 1068 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 26 PID 576 wrote to memory of 1068 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 26 PID 576 wrote to memory of 1068 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 26 PID 576 wrote to memory of 1068 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 26 PID 1068 wrote to memory of 1640 1068 cmd.exe 28 PID 1068 wrote to memory of 1640 1068 cmd.exe 28 PID 1068 wrote to memory of 1640 1068 cmd.exe 28 PID 1068 wrote to memory of 1640 1068 cmd.exe 28 PID 1640 wrote to memory of 620 1640 iexplore.exe 30 PID 1640 wrote to memory of 620 1640 iexplore.exe 30 PID 1640 wrote to memory of 620 1640 iexplore.exe 30 PID 1640 wrote to memory of 620 1640 iexplore.exe 30 PID 576 wrote to memory of 1640 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 28 PID 576 wrote to memory of 1640 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 28 PID 576 wrote to memory of 1384 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 15 PID 576 wrote to memory of 1384 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 15 PID 576 wrote to memory of 1836 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 31 PID 576 wrote to memory of 1836 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 31 PID 576 wrote to memory of 1836 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 31 PID 576 wrote to memory of 1836 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 31 PID 576 wrote to memory of 1416 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 33 PID 576 wrote to memory of 1416 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 33 PID 576 wrote to memory of 1416 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 33 PID 576 wrote to memory of 1416 576 a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe"C:\Users\Admin\AppData\Local\Temp\a3cb786ef604b849dfdee3f6a9f4356e8fb4204e018f53c0799a5348f06ee2c0.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding3⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:620
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fig7273.bat"3⤵PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 576 -s 1403⤵
- Program crash
PID:1416
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5546eab929b7be7d013da0148c423ebf1
SHA1c0513a5f1c99f7b42d55e23d059e76a2f3adecbe
SHA256efa0876455000a5bef22d3dda89258f2083b3b65476897d8f14c499bcbb91b00
SHA512e9b2fd91f7f47781a1c94284008a7fd97b6290d23eed23c5e91bdc1402efa8a5237e345ecbcf8db1943644815d207da73f4ab58bd955cf2a2acc658c5c20680c
-
Filesize
38KB
MD5ba571f16760b1edc0a3b0ba384e8698f
SHA1a4e3328f0f9c476db90208cfe96c4be69da70645
SHA256afff2d01281449bb050310decf680ddee2ef8eec0be72519eddbfd16081139c1
SHA512d548739479704e3a95920d43fff4abcb76dc5494bd8b57a27367cbe451250b9c8b8becd190fcce2fdb69a796a5b04218f82d33660584dc78ece7a1ec814d3aff
-
Filesize
601B
MD5bd5ebd214458e5d7bf645e2a576c6a21
SHA1a1c4a891557920d2e4a51267514b9abe082c3737
SHA2561782df5fc82599952d4d29b06ebed383250eebf83a7f8e222df03fec64bbf0f1
SHA512bc54a7e7d4913016222c4d9f1cdc53a6d2f0799fe7ce21a21885509e76b21c5d7dedc78aded08956439ca0f2939329cfc9457f4ff970008ff2fa4dfc79c556fe
-
Filesize
38KB
MD5ba571f16760b1edc0a3b0ba384e8698f
SHA1a4e3328f0f9c476db90208cfe96c4be69da70645
SHA256afff2d01281449bb050310decf680ddee2ef8eec0be72519eddbfd16081139c1
SHA512d548739479704e3a95920d43fff4abcb76dc5494bd8b57a27367cbe451250b9c8b8becd190fcce2fdb69a796a5b04218f82d33660584dc78ece7a1ec814d3aff