Analysis
-
max time kernel
170s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe
Resource
win10v2004-20220812-en
General
-
Target
baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe
-
Size
10.3MB
-
MD5
0b66d0aab53443b67125798e868484e4
-
SHA1
e8a1d09728ef0f3365d7c85d9af4de6c395e832e
-
SHA256
baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8
-
SHA512
e173a1b56d5db2a829891509050c7cf5c5bc982f96ccfa3a4cb92f509567ff68534b7802c225ef182e61e07e8eb4350b17ba59229bbe7e38af92b478e94576a3
-
SSDEEP
196608:mM38+eI7nruZnXQUDgvBigflIdNlsC26xJ8vFFanBQI2UhVxdXuo:mBXI7ndCgvYgIdNlJ2uJ2y2Uheo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1192 eXtreme.Movie.Manager.Pro.v6.2.5.0.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\OALX\ImagePath = "C:\\ProgramData\\Tmqat\\Xweef.exe" baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe -
Loads dropped DLL 3 IoCs
pid Process 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 1192 eXtreme.Movie.Manager.Pro.v6.2.5.0.exe 1192 eXtreme.Movie.Manager.Pro.v6.2.5.0.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eXtreme.Movie.Manager.Pro.v6.2.5.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2949baa651025479e04fc8b1f0d474100000000020000000000106600000001000020000000749c40283204445d34a960578130c8954da9dc4e8c6b063f892238eede3da699000000000e800000000200002000000026bc9eac4c84e23e953f86e24fb4a1ad08a4bff3fd700c815dc728c496f68a1220000000028f8e464ed5a5bed69f0bfd323f9c12d018fc97d3ad084799d95b18b0fc60ba40000000b9cb48cf12a1878f25b7d826a42b3a2bf895f71e1bca46fa3b951543071784fded267636663c824ad4f16f1aeed5b879f0a86c0f2a31662469385e709d0a34b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f021fa90c60cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main eXtreme.Movie.Manager.Pro.v6.2.5.0.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1983AA1-78B9-11ED-99B1-EA25B6F29539} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377462422" iexplore.exe -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 684 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1192 eXtreme.Movie.Manager.Pro.v6.2.5.0.exe 1192 eXtreme.Movie.Manager.Pro.v6.2.5.0.exe 684 iexplore.exe 684 iexplore.exe 832 IEXPLORE.EXE 832 IEXPLORE.EXE 832 IEXPLORE.EXE 832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1600 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 27 PID 1352 wrote to memory of 1600 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 27 PID 1352 wrote to memory of 1600 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 27 PID 1352 wrote to memory of 1600 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 27 PID 1352 wrote to memory of 1600 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 27 PID 1352 wrote to memory of 1600 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 27 PID 1352 wrote to memory of 1600 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 27 PID 1600 wrote to memory of 1996 1600 Net.exe 29 PID 1600 wrote to memory of 1996 1600 Net.exe 29 PID 1600 wrote to memory of 1996 1600 Net.exe 29 PID 1600 wrote to memory of 1996 1600 Net.exe 29 PID 1600 wrote to memory of 1996 1600 Net.exe 29 PID 1600 wrote to memory of 1996 1600 Net.exe 29 PID 1600 wrote to memory of 1996 1600 Net.exe 29 PID 1352 wrote to memory of 1192 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 30 PID 1352 wrote to memory of 1192 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 30 PID 1352 wrote to memory of 1192 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 30 PID 1352 wrote to memory of 1192 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 30 PID 1352 wrote to memory of 1192 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 30 PID 1352 wrote to memory of 1192 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 30 PID 1352 wrote to memory of 1192 1352 baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe 30 PID 684 wrote to memory of 832 684 iexplore.exe 33 PID 684 wrote to memory of 832 684 iexplore.exe 33 PID 684 wrote to memory of 832 684 iexplore.exe 33 PID 684 wrote to memory of 832 684 iexplore.exe 33 PID 684 wrote to memory of 832 684 iexplore.exe 33 PID 684 wrote to memory of 832 684 iexplore.exe 33 PID 684 wrote to memory of 832 684 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe"C:\Users\Admin\AppData\Local\Temp\baef3d2a96bb7c1baab7cc31bf319dd93f7f153c7db02e88f1c6267918cdcaf8.exe"1⤵
- Sets service image path in registry
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Net.exeNet Stop PcaSvc2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 Stop PcaSvc3⤵PID:1996
-
-
-
C:\Users\Admin\AppData\Local\Temp\g86A29\eXtreme.Movie.Manager.Pro.v6.2.5.0.exeC:\Users\Admin\AppData\Local\Temp\g86A29\eXtreme.Movie.Manager.Pro.v6.2.5.0.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536021a22e52cc10f75bffb576f5ffa3e
SHA1397e38dd07429ee09c9ef4d987f1cfb2d2afaf3b
SHA2569ee419f13ab66aa08c1f969ce4038c0c433d809e5089c2105be3cea3eee06784
SHA5124bc917758a69561cb74de25d80e2a2e251cfe4b161e612ae736f182108cf2651a06618283c7314c082fc261ea82cbc226e50726c0f7959e6e5560554b88df8ef
-
Filesize
8.4MB
MD5acc2275cef3e426f6195b0125fdfd121
SHA1f5aaebd1d643cb0a5d7d9c6ae268fef7af4ffefa
SHA256c3b5c3310dce1a54d82a6219da80925900ce2f972e954dbcf8bbfc2a41906039
SHA5123aa69b3f02169fa7845a6348b9a98d35ba34550b45fef11c33ab6d2b2a13e2bbe5aaadc8c32b9e38dfae89402f22164b045d46fefb5ea9eeac24b41226804fe5
-
Filesize
8.4MB
MD5acc2275cef3e426f6195b0125fdfd121
SHA1f5aaebd1d643cb0a5d7d9c6ae268fef7af4ffefa
SHA256c3b5c3310dce1a54d82a6219da80925900ce2f972e954dbcf8bbfc2a41906039
SHA5123aa69b3f02169fa7845a6348b9a98d35ba34550b45fef11c33ab6d2b2a13e2bbe5aaadc8c32b9e38dfae89402f22164b045d46fefb5ea9eeac24b41226804fe5
-
Filesize
608B
MD5c7910cc9fc616c61b4c7e4744d27407b
SHA1849a97a621eddca4204fb4d5bd2a6769f1adc620
SHA25655ec1cc774118abaf229cb12a84565e76ceea2a4ffd18414fc34d0931ac48fe9
SHA5127c156eea8d011df068411439125ed0bf137d39417376d25cfbc696e088e7e5bd6f14420d7e0d53554436b3f2659023aafba6e304f55a7af4c58829b41031d6cb
-
Filesize
8.4MB
MD5acc2275cef3e426f6195b0125fdfd121
SHA1f5aaebd1d643cb0a5d7d9c6ae268fef7af4ffefa
SHA256c3b5c3310dce1a54d82a6219da80925900ce2f972e954dbcf8bbfc2a41906039
SHA5123aa69b3f02169fa7845a6348b9a98d35ba34550b45fef11c33ab6d2b2a13e2bbe5aaadc8c32b9e38dfae89402f22164b045d46fefb5ea9eeac24b41226804fe5
-
Filesize
8.4MB
MD5acc2275cef3e426f6195b0125fdfd121
SHA1f5aaebd1d643cb0a5d7d9c6ae268fef7af4ffefa
SHA256c3b5c3310dce1a54d82a6219da80925900ce2f972e954dbcf8bbfc2a41906039
SHA5123aa69b3f02169fa7845a6348b9a98d35ba34550b45fef11c33ab6d2b2a13e2bbe5aaadc8c32b9e38dfae89402f22164b045d46fefb5ea9eeac24b41226804fe5
-
Filesize
8.4MB
MD5acc2275cef3e426f6195b0125fdfd121
SHA1f5aaebd1d643cb0a5d7d9c6ae268fef7af4ffefa
SHA256c3b5c3310dce1a54d82a6219da80925900ce2f972e954dbcf8bbfc2a41906039
SHA5123aa69b3f02169fa7845a6348b9a98d35ba34550b45fef11c33ab6d2b2a13e2bbe5aaadc8c32b9e38dfae89402f22164b045d46fefb5ea9eeac24b41226804fe5