Analysis
-
max time kernel
161s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 19:58
Static task
static1
Behavioral task
behavioral1
Sample
b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe
Resource
win10v2004-20220812-en
General
-
Target
b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe
-
Size
12KB
-
MD5
3a7bec068bd5ddc12b3266df7ae68d04
-
SHA1
6f66bf634751ca44f2e1959c89b253266c1bd8f9
-
SHA256
b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84
-
SHA512
21ed9867ac77bebaf4d0888c2641d72babdd6101985ffd38b1928be42ba0d4e7dad39794b096be1da20fe260a3cd6e864c72ece925dc83761087bc432158564e
-
SSDEEP
192:7RksiESTYWtTIwpuHR0MgvVc/iF/JA73fMORINPk6WvW1EDp2B/0V/9SNs/:isiESTBEwAR0MgtiwJ+PMHPk6WvW1EDt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1128 Run39.exe -
Loads dropped DLL 2 IoCs
pid Process 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Run39.exe = "C:\\Windows\\system\\Run39.exe" Run39.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\N0TEPAD.EXE Run39.exe File created C:\Windows\SysWOW64\N0TEPAD.EXE Run39.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\N0TEPAD.EXE Run39.exe File opened for modification C:\Windows\N0TEPAD.EXE Run39.exe File opened for modification C:\Windows\system\windll.dll Run39.exe File created C:\Windows\system\Run39.exe b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe File opened for modification C:\Windows\system\Run39.exe b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe File created C:\Windows\system\N0TEPAD.EXE Run39.exe File opened for modification C:\Windows\system\N0TEPAD.EXE Run39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C922ABC1-7854-11ED-96D2-EEBA1A0FFCD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377419098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "189" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\Total = "189" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net\ = "189" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou8.bar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou8.bar\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou8.bar\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.18hi.net\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\hongdou8.bar\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "252" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DOMStorage\18hi.net\Total = "126" IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "about:blank" Run39.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "N0TEPAD.EXE %1" Run39.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 464 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 1128 Run39.exe 464 iexplore.exe 464 iexplore.exe 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 576 wrote to memory of 464 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 28 PID 576 wrote to memory of 464 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 28 PID 576 wrote to memory of 464 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 28 PID 576 wrote to memory of 464 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 28 PID 576 wrote to memory of 1128 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 30 PID 576 wrote to memory of 1128 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 30 PID 576 wrote to memory of 1128 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 30 PID 576 wrote to memory of 1128 576 b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe 30 PID 464 wrote to memory of 1560 464 iexplore.exe 31 PID 464 wrote to memory of 1560 464 iexplore.exe 31 PID 464 wrote to memory of 1560 464 iexplore.exe 31 PID 464 wrote to memory of 1560 464 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe"C:\Users\Admin\AppData\Local\Temp\b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.18hi.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:464 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
-
C:\Windows\system\Run39.exe"C:\Windows\system\Run39.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e95933060e813cc5a6ffcc7f88c6c2d
SHA17912056bbab6f18c2eb1a7aafde5c65ec4c53f06
SHA256b4bbe0196d159d8b2761c5db7e11de4366aa467d53c847e9c21eb272b6de30b8
SHA5126294c07185094fe15db567b958b691ddb822cdc9ffe1bdce7d6d576303760bddfe5033d4a11aea2873d266e035dfbcf8dd9db7ba1429d5a0a5412e85136cc706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd62850df760f26c8f2f48b25de8844
SHA1f682831195c56cf61a0d70ddb93dd2b18d4e0698
SHA2566dd139a475dba550dc4f5b0ef4915247f4ff0ac57dde25772c40a4bb32db1399
SHA5126c0f4c2ab95542ab6fc16e57fe41f02c3a905b4e8c99ffad5e7a9d51e8fc7dd20c579ece78ada88a1e47c820fb6de1308885fcae9df3f2e37ea7577aebf691e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0dc833c9581c7514042c9f95173f830
SHA138d67eb9beca5a8f4f53303bf1a35afe88e135ff
SHA25636ebee916927736821b5cb3a4daca8ca8ac9a43bd56caad48cb48359186af916
SHA5124119ae610df821db576e1a76743a39e3694015094edc27c6a70aadd732738b323df1f33562e882af6d974d65b2835e553a74a0af135809492a0564bf16140f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e1cb6d050f67fca36e5a6e466b13b96b
SHA18be93b9d9d5fb6d9b8871008e3e89de9b4413e70
SHA256860386ff81b46cb457269dc2c6f54bbe15a9ce9fb2c85885e17f94b30b0e089f
SHA51202681312e13d8f0c6bc4a026d09b6b427025bbab5a832e6990f5be68d0c5eff6729cffa0c0b7f67128feba36fd2d7a8d4391aa85b355bdf3d1fce17a9abf5bfb
-
Filesize
608B
MD5e12b949757c89eb6ade465ee8ef5b8a7
SHA1507b99197e5410f73cfdc536ef28398f61fb782e
SHA2562b727a5e20d1956acfb6e9b860c0bb49e896d36fdcfe683cdb4ab9e483a07878
SHA5129e7b5869200cd2628b24afa53df17b7af4e8c2752c290f9ca7e50ba4cda94478638ba5661b877fc08c67e881343cd54c022aefa8d4a64a4c9dabc36bda16c7d6
-
Filesize
12KB
MD53a7bec068bd5ddc12b3266df7ae68d04
SHA16f66bf634751ca44f2e1959c89b253266c1bd8f9
SHA256b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84
SHA51221ed9867ac77bebaf4d0888c2641d72babdd6101985ffd38b1928be42ba0d4e7dad39794b096be1da20fe260a3cd6e864c72ece925dc83761087bc432158564e
-
Filesize
12KB
MD53a7bec068bd5ddc12b3266df7ae68d04
SHA16f66bf634751ca44f2e1959c89b253266c1bd8f9
SHA256b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84
SHA51221ed9867ac77bebaf4d0888c2641d72babdd6101985ffd38b1928be42ba0d4e7dad39794b096be1da20fe260a3cd6e864c72ece925dc83761087bc432158564e
-
Filesize
12KB
MD53a7bec068bd5ddc12b3266df7ae68d04
SHA16f66bf634751ca44f2e1959c89b253266c1bd8f9
SHA256b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84
SHA51221ed9867ac77bebaf4d0888c2641d72babdd6101985ffd38b1928be42ba0d4e7dad39794b096be1da20fe260a3cd6e864c72ece925dc83761087bc432158564e
-
Filesize
12KB
MD53a7bec068bd5ddc12b3266df7ae68d04
SHA16f66bf634751ca44f2e1959c89b253266c1bd8f9
SHA256b8ad3a57d61ecb4b19607bc407b89144217d572b7fcb6997bbe4a899fb2a3c84
SHA51221ed9867ac77bebaf4d0888c2641d72babdd6101985ffd38b1928be42ba0d4e7dad39794b096be1da20fe260a3cd6e864c72ece925dc83761087bc432158564e