Analysis
-
max time kernel
146s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 23:14
Static task
static1
Behavioral task
behavioral1
Sample
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe
Resource
win10v2004-20220812-en
General
-
Target
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe
-
Size
519KB
-
MD5
525f1adc261eeb1bba5366b5d1ee905c
-
SHA1
812a785e0a5c8c0ed54c8a82c42240d00005aee6
-
SHA256
ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e
-
SHA512
f9280c974703b0176847c697b77e60c3603662226375c56a5142a2d24dca74aae8b8385c26cd3bfc22580150a5cf268d584c7c696bf2dd1c1058db10050edad8
-
SSDEEP
12288:jbQg8276OuF2qLSt3+Ofr+aD991RpvknDhDI2JCU77Uu:jbQg827TuF22SJzfygX1RpsDI2AU7v
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4924 Lock.exe 2224 ²¹¶¡3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat ²¹¶¡3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2224 set thread context of 916 2224 ²¹¶¡3.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7FF31EFF-7973-11ED-B696-D2D0017C8629} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377542246" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 916 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 916 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4924 Lock.exe 4924 Lock.exe 916 IEXPLORE.EXE 916 IEXPLORE.EXE 1088 IEXPLORE.EXE 1088 IEXPLORE.EXE 1088 IEXPLORE.EXE 1088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4924 4856 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 82 PID 4856 wrote to memory of 4924 4856 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 82 PID 4856 wrote to memory of 4924 4856 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 82 PID 4856 wrote to memory of 2224 4856 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 83 PID 4856 wrote to memory of 2224 4856 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 83 PID 4856 wrote to memory of 2224 4856 ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe 83 PID 2224 wrote to memory of 916 2224 ²¹¶¡3.exe 84 PID 2224 wrote to memory of 916 2224 ²¹¶¡3.exe 84 PID 2224 wrote to memory of 916 2224 ²¹¶¡3.exe 84 PID 2224 wrote to memory of 2040 2224 ²¹¶¡3.exe 85 PID 2224 wrote to memory of 2040 2224 ²¹¶¡3.exe 85 PID 2224 wrote to memory of 2040 2224 ²¹¶¡3.exe 85 PID 916 wrote to memory of 1088 916 IEXPLORE.EXE 87 PID 916 wrote to memory of 1088 916 IEXPLORE.EXE 87 PID 916 wrote to memory of 1088 916 IEXPLORE.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe"C:\Users\Admin\AppData\Local\Temp\ef643cd0d1b432d6db1e9dc20fb3868f30903a302763738a31e8f391f385b92e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Lock.exe"C:\Users\Admin\AppData\Local\Temp\Lock.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\²¹¶¡3.exe"C:\Users\Admin\AppData\Local\Temp\²¹¶¡3.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:916 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat3⤵PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5cc4d846fcf2b1f2b1bfbe7ad94b3e22a
SHA187bdbdda4cae536a0d7954c04dd6c980d37c07a2
SHA256442e2ea17989049c5e715d77e9bdf33c412a31b5cab55884360afab1877b3d8d
SHA5124e19d1b45bb5818604b625abc5808a80e8608c6572c45dfa3305a4832698d71822261d8ed73f4394b32cad2605e1926cb5f19ce9b62c901a148c4257bdf8d4d1
-
Filesize
476KB
MD5cc4d846fcf2b1f2b1bfbe7ad94b3e22a
SHA187bdbdda4cae536a0d7954c04dd6c980d37c07a2
SHA256442e2ea17989049c5e715d77e9bdf33c412a31b5cab55884360afab1877b3d8d
SHA5124e19d1b45bb5818604b625abc5808a80e8608c6572c45dfa3305a4832698d71822261d8ed73f4394b32cad2605e1926cb5f19ce9b62c901a148c4257bdf8d4d1
-
Filesize
18KB
MD5ce428236b3bd1ccf0ba65a492c85c799
SHA1b896a24425f1c8eaf033b6b87e0fc3e2a8d8cf81
SHA2569666eaed7bd51b8242a15cb49e44efd0f3c555e5afd3c49492ec3873231c0c65
SHA512f68abeb7a1a3021b845735e940ffed3a8e250f24dc5eaa4a69fb2429232f7bbdb1c4b2701bb7b155e3f419c96c2ecbee76cb1e079cfe5a8dcca48b82465d99ce
-
Filesize
18KB
MD5ce428236b3bd1ccf0ba65a492c85c799
SHA1b896a24425f1c8eaf033b6b87e0fc3e2a8d8cf81
SHA2569666eaed7bd51b8242a15cb49e44efd0f3c555e5afd3c49492ec3873231c0c65
SHA512f68abeb7a1a3021b845735e940ffed3a8e250f24dc5eaa4a69fb2429232f7bbdb1c4b2701bb7b155e3f419c96c2ecbee76cb1e079cfe5a8dcca48b82465d99ce
-
Filesize
130B
MD5ea04295f020438658d6d596384596513
SHA1f975ecf9f388a71e6de9dd91af775e5cf6aa5293
SHA2561ed8c3f3b16226048105278ca05206adeaed7a25aea6a10b64df1e07eda5d8ce
SHA512cfa4f9265ee84a6315ece055bcb578368ce5a67015ee1ca223efeace5456861c37dc1a92451f75d36007d464a669e5db04f07ae79ca706653c980b85b58e711f