Analysis
-
max time kernel
133s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe
Resource
win10v2004-20220812-en
General
-
Target
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe
-
Size
519KB
-
MD5
525f1adc261eeb1bba5366b5d1ee905c
-
SHA1
812a785e0a5c8c0ed54c8a82c42240d00005aee6
-
SHA256
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e
-
SHA512
f9280c974703b0176847c697b77e60c3603662226375c56a5142a2d24dca74aae8b8385c26cd3bfc22580150a5cf268d584c7c696bf2dd1c1058db10050edad8
-
SSDEEP
12288:jbQg8276OuF2qLSt3+Ofr+aD991RpvknDhDI2JCU77Uu:jbQg827TuF22SJzfygX1RpsDI2AU7v
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2020 Lock.exe 468 ²¹¶¡3.exe -
Loads dropped DLL 4 IoCs
pid Process 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat ²¹¶¡3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 468 set thread context of 668 468 ²¹¶¡3.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0CA3DD1-7973-11ED-B4FE-5A5CFA1077B6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377542286" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 668 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2020 Lock.exe 2020 Lock.exe 668 IEXPLORE.EXE 668 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2020 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 28 PID 1244 wrote to memory of 2020 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 28 PID 1244 wrote to memory of 2020 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 28 PID 1244 wrote to memory of 2020 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 28 PID 1244 wrote to memory of 468 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 29 PID 1244 wrote to memory of 468 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 29 PID 1244 wrote to memory of 468 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 29 PID 1244 wrote to memory of 468 1244 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 29 PID 468 wrote to memory of 668 468 ²¹¶¡3.exe 30 PID 468 wrote to memory of 668 468 ²¹¶¡3.exe 30 PID 468 wrote to memory of 668 468 ²¹¶¡3.exe 30 PID 468 wrote to memory of 668 468 ²¹¶¡3.exe 30 PID 468 wrote to memory of 668 468 ²¹¶¡3.exe 30 PID 468 wrote to memory of 1276 468 ²¹¶¡3.exe 31 PID 468 wrote to memory of 1276 468 ²¹¶¡3.exe 31 PID 468 wrote to memory of 1276 468 ²¹¶¡3.exe 31 PID 468 wrote to memory of 1276 468 ²¹¶¡3.exe 31 PID 668 wrote to memory of 1316 668 IEXPLORE.EXE 34 PID 668 wrote to memory of 1316 668 IEXPLORE.EXE 34 PID 668 wrote to memory of 1316 668 IEXPLORE.EXE 34 PID 668 wrote to memory of 1316 668 IEXPLORE.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe"C:\Users\Admin\AppData\Local\Temp\ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Lock.exe"C:\Users\Admin\AppData\Local\Temp\Lock.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\²¹¶¡3.exe"C:\Users\Admin\AppData\Local\Temp\²¹¶¡3.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:468 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:668 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat3⤵PID:1276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5cc4d846fcf2b1f2b1bfbe7ad94b3e22a
SHA187bdbdda4cae536a0d7954c04dd6c980d37c07a2
SHA256442e2ea17989049c5e715d77e9bdf33c412a31b5cab55884360afab1877b3d8d
SHA5124e19d1b45bb5818604b625abc5808a80e8608c6572c45dfa3305a4832698d71822261d8ed73f4394b32cad2605e1926cb5f19ce9b62c901a148c4257bdf8d4d1
-
Filesize
18KB
MD5ce428236b3bd1ccf0ba65a492c85c799
SHA1b896a24425f1c8eaf033b6b87e0fc3e2a8d8cf81
SHA2569666eaed7bd51b8242a15cb49e44efd0f3c555e5afd3c49492ec3873231c0c65
SHA512f68abeb7a1a3021b845735e940ffed3a8e250f24dc5eaa4a69fb2429232f7bbdb1c4b2701bb7b155e3f419c96c2ecbee76cb1e079cfe5a8dcca48b82465d99ce
-
Filesize
18KB
MD5ce428236b3bd1ccf0ba65a492c85c799
SHA1b896a24425f1c8eaf033b6b87e0fc3e2a8d8cf81
SHA2569666eaed7bd51b8242a15cb49e44efd0f3c555e5afd3c49492ec3873231c0c65
SHA512f68abeb7a1a3021b845735e940ffed3a8e250f24dc5eaa4a69fb2429232f7bbdb1c4b2701bb7b155e3f419c96c2ecbee76cb1e079cfe5a8dcca48b82465d99ce
-
Filesize
608B
MD5067823491edb7f9b54fd88982f18f56f
SHA1db7d4988f4c5aaa6210f2740e9e3760822bd5a61
SHA256c6fdf75572b21250faff6e84ba88da59e9d4ed58f9c41d780aca7eb6ded37298
SHA512a12740101663ff66a5d4587cca0e432cbe47855c788908bf6b90446248b36155edd7c83be0b45987924a5ba68a7f4207173f410752667ecdc1faa6be7bc5a182
-
Filesize
130B
MD5ea04295f020438658d6d596384596513
SHA1f975ecf9f388a71e6de9dd91af775e5cf6aa5293
SHA2561ed8c3f3b16226048105278ca05206adeaed7a25aea6a10b64df1e07eda5d8ce
SHA512cfa4f9265ee84a6315ece055bcb578368ce5a67015ee1ca223efeace5456861c37dc1a92451f75d36007d464a669e5db04f07ae79ca706653c980b85b58e711f
-
Filesize
476KB
MD5cc4d846fcf2b1f2b1bfbe7ad94b3e22a
SHA187bdbdda4cae536a0d7954c04dd6c980d37c07a2
SHA256442e2ea17989049c5e715d77e9bdf33c412a31b5cab55884360afab1877b3d8d
SHA5124e19d1b45bb5818604b625abc5808a80e8608c6572c45dfa3305a4832698d71822261d8ed73f4394b32cad2605e1926cb5f19ce9b62c901a148c4257bdf8d4d1
-
Filesize
476KB
MD5cc4d846fcf2b1f2b1bfbe7ad94b3e22a
SHA187bdbdda4cae536a0d7954c04dd6c980d37c07a2
SHA256442e2ea17989049c5e715d77e9bdf33c412a31b5cab55884360afab1877b3d8d
SHA5124e19d1b45bb5818604b625abc5808a80e8608c6572c45dfa3305a4832698d71822261d8ed73f4394b32cad2605e1926cb5f19ce9b62c901a148c4257bdf8d4d1
-
Filesize
18KB
MD5ce428236b3bd1ccf0ba65a492c85c799
SHA1b896a24425f1c8eaf033b6b87e0fc3e2a8d8cf81
SHA2569666eaed7bd51b8242a15cb49e44efd0f3c555e5afd3c49492ec3873231c0c65
SHA512f68abeb7a1a3021b845735e940ffed3a8e250f24dc5eaa4a69fb2429232f7bbdb1c4b2701bb7b155e3f419c96c2ecbee76cb1e079cfe5a8dcca48b82465d99ce
-
Filesize
18KB
MD5ce428236b3bd1ccf0ba65a492c85c799
SHA1b896a24425f1c8eaf033b6b87e0fc3e2a8d8cf81
SHA2569666eaed7bd51b8242a15cb49e44efd0f3c555e5afd3c49492ec3873231c0c65
SHA512f68abeb7a1a3021b845735e940ffed3a8e250f24dc5eaa4a69fb2429232f7bbdb1c4b2701bb7b155e3f419c96c2ecbee76cb1e079cfe5a8dcca48b82465d99ce