Analysis
-
max time kernel
96s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 17:31
Static task
static1
Behavioral task
behavioral1
Sample
837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe
Resource
win10v2004-20220812-en
General
-
Target
837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe
-
Size
111KB
-
MD5
bc28526297b712001cb57eef996e57a5
-
SHA1
9e028fe02e303cf9e20d3477158da1e3b4834cd1
-
SHA256
837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b
-
SHA512
13393896ce76ca138dcb97d697f186bd7cc2d8408729c2edab6d3745880336264e9006d58f62f892d59be59e44ef1904209397620d894a95cd06fad5145dce08
-
SSDEEP
768:W58tw1IhwJywL/LcbiU4OkbzZR/9f+3xsduAdZBwA6Yzf349YX/r4rmtX1oO3evv:WAwWU+hDA5bTxzoOoxaoxf/0llsQVAu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 996 Original Pagg V.37.exe -
Loads dropped DLL 3 IoCs
pid Process 1904 837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe 1904 837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe 996 Original Pagg V.37.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377405832" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEA7EBA1-7835-11ED-8FA4-466E2F293893} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 996 Original Pagg V.37.exe 2036 iexplore.exe 2036 iexplore.exe 800 IEXPLORE.EXE 800 IEXPLORE.EXE 800 IEXPLORE.EXE 800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1904 wrote to memory of 996 1904 837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe 28 PID 1904 wrote to memory of 996 1904 837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe 28 PID 1904 wrote to memory of 996 1904 837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe 28 PID 1904 wrote to memory of 996 1904 837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe 28 PID 996 wrote to memory of 2036 996 Original Pagg V.37.exe 29 PID 996 wrote to memory of 2036 996 Original Pagg V.37.exe 29 PID 996 wrote to memory of 2036 996 Original Pagg V.37.exe 29 PID 996 wrote to memory of 2036 996 Original Pagg V.37.exe 29 PID 2036 wrote to memory of 800 2036 iexplore.exe 31 PID 2036 wrote to memory of 800 2036 iexplore.exe 31 PID 2036 wrote to memory of 800 2036 iexplore.exe 31 PID 2036 wrote to memory of 800 2036 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe"C:\Users\Admin\AppData\Local\Temp\837103031ef3a1f93c4fb646ac3f60f9d8e562bd2ae931249fe028bd7634ed1b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\~sfx0021FADE44\Original Pagg V.37.exe"C:\Users\Admin\AppData\Local\Temp\~sfx0021FADE44\Original Pagg V.37.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://originalpagg.co.cc/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:800
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f804f0acdf4d8aca9cdceb5bb10ea6
SHA1643df1dab023fae3b1b924e3239840163ee51d51
SHA2563eae6a55628e266d6743e3332e68dbb271dfbb8481b7524cc97123cad6b36733
SHA51233a3d498d9fcc9e1e14b9f9a797c25850bda9ad147182cceec2a044850abfdd951e5d7d9e6554c6f5a2fa4023d4098ebb8f5708400b1504a1b7e8be98b8a0c1f
-
Filesize
36KB
MD5627146fa4cf858d1d8c3c5174d5426da
SHA135873a591879f460c9ce22f483bfb9ed74736d2f
SHA25657a002e2a96a9b92d7bc9369e2768ed1adf6760f14904a69164e0d891b45eee4
SHA5126803b85c0ce49d0d989d1b80329fe88eff6b0d7e159b591575584a3959cdd69b346806bfdb711c72a6ba340922babbee5fd2e777484a1b4faef9a5adf6c1299f
-
Filesize
36KB
MD5627146fa4cf858d1d8c3c5174d5426da
SHA135873a591879f460c9ce22f483bfb9ed74736d2f
SHA25657a002e2a96a9b92d7bc9369e2768ed1adf6760f14904a69164e0d891b45eee4
SHA5126803b85c0ce49d0d989d1b80329fe88eff6b0d7e159b591575584a3959cdd69b346806bfdb711c72a6ba340922babbee5fd2e777484a1b4faef9a5adf6c1299f
-
Filesize
602B
MD5dd35d70330f4800974ead351b343ed30
SHA1b018376ba578bd1bb3272663421d1682383542f8
SHA2560b20a22f5b135f513c134d208e066d554ce2bd72c6228d8769dc453ac2785790
SHA5122764361800e47e075c1801556ec19c09602a8e64645278af14e4ea77a600c412c2d8cbd3bb7a95a7a5104f12c11103b89669e650b327da12090010f90acfc728
-
Filesize
36KB
MD5627146fa4cf858d1d8c3c5174d5426da
SHA135873a591879f460c9ce22f483bfb9ed74736d2f
SHA25657a002e2a96a9b92d7bc9369e2768ed1adf6760f14904a69164e0d891b45eee4
SHA5126803b85c0ce49d0d989d1b80329fe88eff6b0d7e159b591575584a3959cdd69b346806bfdb711c72a6ba340922babbee5fd2e777484a1b4faef9a5adf6c1299f
-
Filesize
36KB
MD5627146fa4cf858d1d8c3c5174d5426da
SHA135873a591879f460c9ce22f483bfb9ed74736d2f
SHA25657a002e2a96a9b92d7bc9369e2768ed1adf6760f14904a69164e0d891b45eee4
SHA5126803b85c0ce49d0d989d1b80329fe88eff6b0d7e159b591575584a3959cdd69b346806bfdb711c72a6ba340922babbee5fd2e777484a1b4faef9a5adf6c1299f
-
Filesize
36KB
MD5627146fa4cf858d1d8c3c5174d5426da
SHA135873a591879f460c9ce22f483bfb9ed74736d2f
SHA25657a002e2a96a9b92d7bc9369e2768ed1adf6760f14904a69164e0d891b45eee4
SHA5126803b85c0ce49d0d989d1b80329fe88eff6b0d7e159b591575584a3959cdd69b346806bfdb711c72a6ba340922babbee5fd2e777484a1b4faef9a5adf6c1299f