Analysis
-
max time kernel
182s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe
Resource
win10v2004-20221111-en
General
-
Target
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe
-
Size
766KB
-
MD5
5876afe51b248a3672782f8cf91e4018
-
SHA1
4d6244a53ce196f7049289b904a763cf4ca0a70d
-
SHA256
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
-
SHA512
8bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
SSDEEP
12288:rcEl4vrJ2NOoCvt8kOmcwNUqVZAGXDvTZaLoVxoyyslF8ycTPHgCn4eSJtWl0zyX:r76DJ2NOoS8kOmcis2TmFy5syQPHgCnD
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000014b5d-54.dat acprotect behavioral1/files/0x0007000000014b5d-66.dat acprotect behavioral1/files/0x0007000000014b5d-67.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1296 AnAnkernel.exe -
resource yara_rule behavioral1/files/0x0007000000014b5d-54.dat upx behavioral1/memory/1984-57-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/files/0x0007000000014b5d-66.dat upx behavioral1/files/0x0007000000014b5d-67.dat upx behavioral1/memory/1296-75-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1984-78-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1296-80-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 832 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 1296 AnAnkernel.exe 1296 AnAnkernel.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\AnAnkernel.exe 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe File opened for modification C:\Program Files (x86)\Common Files\AnAnkernel.exe 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe File created C:\Program Files (x86)\Common Files\AnAnkernel.dll AnAnkernel.exe File opened for modification C:\Program Files (x86)\Common Files\AnAnkernel.dll AnAnkernel.exe File created C:\Program Files\Internet Explorer\IJL15.DLL AnAnkernel.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\bbf34dbefbbdf9c384f01aed7e3a1c20.dat AnAnkernel.exe File opened for modification C:\Windows\Fonts\bbf34dbefbbdf9c384f01aed7e3a1c20.dat AnAnkernel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E84E1A41-78C0-11ED-B1EF-6A950B37D0A0} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" AnAnkernel.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377465542" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 1296 AnAnkernel.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 276 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 1296 AnAnkernel.exe 276 IEXPLORE.EXE 276 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1296 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 27 PID 1984 wrote to memory of 1296 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 27 PID 1984 wrote to memory of 1296 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 27 PID 1984 wrote to memory of 1296 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 27 PID 1296 wrote to memory of 276 1296 AnAnkernel.exe 28 PID 1296 wrote to memory of 276 1296 AnAnkernel.exe 28 PID 1296 wrote to memory of 276 1296 AnAnkernel.exe 28 PID 1296 wrote to memory of 276 1296 AnAnkernel.exe 28 PID 276 wrote to memory of 1792 276 IEXPLORE.EXE 30 PID 276 wrote to memory of 1792 276 IEXPLORE.EXE 30 PID 276 wrote to memory of 1792 276 IEXPLORE.EXE 30 PID 276 wrote to memory of 1792 276 IEXPLORE.EXE 30 PID 1984 wrote to memory of 832 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 31 PID 1984 wrote to memory of 832 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 31 PID 1984 wrote to memory of 832 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 31 PID 1984 wrote to memory of 832 1984 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 31 PID 1296 wrote to memory of 276 1296 AnAnkernel.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe"C:\Users\Admin\AppData\Local\Temp\9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Common Files\AnAnkernel.exe"C:\Program Files (x86)\Common Files\AnAnkernel.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\del_file_1.bat2⤵
- Deletes itself
PID:832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766KB
MD55876afe51b248a3672782f8cf91e4018
SHA14d6244a53ce196f7049289b904a763cf4ca0a70d
SHA2569c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
SHA5128bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
Filesize
766KB
MD55876afe51b248a3672782f8cf91e4018
SHA14d6244a53ce196f7049289b904a763cf4ca0a70d
SHA2569c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
SHA5128bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
Filesize
72KB
MD54b93667fd1049edc44df7888773e24d6
SHA145a73a3b4c3e43118c6b264a5dd7d30b6cca4e4f
SHA256f650908d54de80e4cf3a7859efe11812e41e3e4515050434cff904e6a150453a
SHA5127bffbc049906b990c12820afe004b67b32c83a71c6bd36f6222ff062e9bced38a03f6d80e2dd7b269845ddd986b1517b5e136f5c772d7c6c93f7dc4d12bda0b6
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
406KB
MD56aea0226a87d8d144963ab68b02009ac
SHA16dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a
-
Filesize
601B
MD536bc1ff5ef1e1a97cc5782d6b6d722a3
SHA11fec67536ca1fa7fc183bd35d87886463836cede
SHA256e88fe48466966dc87267ed27a5367758737d0149683b10a21d46b1ad7928f187
SHA5126ac8e46f8d79771e6c19890efb2dca7de4a8ffb67fb0460263812e45f0594b78325dfb9f8ffb3776122b66b95d8fa84411863d077f2dee0626b20f619e0912af
-
Filesize
271B
MD5ec8426955af4f942359449aca3d39889
SHA19e1bd3b18049480c8381db1ad0b5d2033be84369
SHA2560b171c916f0d50a90ac98f7fd00809d1ab4c1e9ec13ba619377c50c3d51fe10c
SHA512f2dd74fc7a742bc63a762b6db438c97295eab6eeb8f90ccee71ef0c35858680da0d2e9f596ae055701783a794ef98bf84c654059fe237ed9bb51812608578970
-
Filesize
766KB
MD55876afe51b248a3672782f8cf91e4018
SHA14d6244a53ce196f7049289b904a763cf4ca0a70d
SHA2569c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
SHA5128bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
Filesize
766KB
MD55876afe51b248a3672782f8cf91e4018
SHA14d6244a53ce196f7049289b904a763cf4ca0a70d
SHA2569c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
SHA5128bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
406KB
MD56aea0226a87d8d144963ab68b02009ac
SHA16dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a
-
Filesize
406KB
MD56aea0226a87d8d144963ab68b02009ac
SHA16dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a