Analysis
-
max time kernel
151s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe
Resource
win10v2004-20221111-en
General
-
Target
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe
-
Size
766KB
-
MD5
5876afe51b248a3672782f8cf91e4018
-
SHA1
4d6244a53ce196f7049289b904a763cf4ca0a70d
-
SHA256
9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
-
SHA512
8bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
SSDEEP
12288:rcEl4vrJ2NOoCvt8kOmcwNUqVZAGXDvTZaLoVxoyyslF8ycTPHgCn4eSJtWl0zyX:r76DJ2NOoS8kOmcis2TmFy5syQPHgCnD
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000300000002265a-134.dat acprotect behavioral2/files/0x000300000002265a-144.dat acprotect behavioral2/files/0x000300000002265a-143.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3992 AnAnkernel.exe -
resource yara_rule behavioral2/files/0x000300000002265a-134.dat upx behavioral2/memory/2196-135-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/files/0x000300000002265a-144.dat upx behavioral2/files/0x000300000002265a-143.dat upx behavioral2/memory/3992-146-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/memory/2196-153-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/memory/3992-156-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 3992 AnAnkernel.exe 3992 AnAnkernel.exe 3992 AnAnkernel.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\AnAnkernel.exe 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe File created C:\Program Files (x86)\Common Files\AnAnkernel.dll AnAnkernel.exe File opened for modification C:\Program Files (x86)\Common Files\AnAnkernel.dll AnAnkernel.exe File created C:\Program Files\Internet Explorer\IJL15.DLL AnAnkernel.exe File created C:\Program Files (x86)\Common Files\AnAnkernel.exe 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\bbf34dbefbbdf9c384f01aed7e3a1c20.dat AnAnkernel.exe File opened for modification C:\Windows\Fonts\bbf34dbefbbdf9c384f01aed7e3a1c20.dat AnAnkernel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001805" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3172635566" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "NO" AnAnkernel.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3172635566" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001805" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E64EAB10-78C0-11ED-919F-7A41DBBD5662} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 3992 AnAnkernel.exe 3992 AnAnkernel.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5004 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 3992 AnAnkernel.exe 5004 IEXPLORE.EXE 5004 IEXPLORE.EXE 3968 IEXPLORE.EXE 3968 IEXPLORE.EXE 3968 IEXPLORE.EXE 3968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2196 wrote to memory of 3992 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 86 PID 2196 wrote to memory of 3992 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 86 PID 2196 wrote to memory of 3992 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 86 PID 3992 wrote to memory of 5004 3992 AnAnkernel.exe 87 PID 3992 wrote to memory of 5004 3992 AnAnkernel.exe 87 PID 5004 wrote to memory of 3968 5004 IEXPLORE.EXE 88 PID 5004 wrote to memory of 3968 5004 IEXPLORE.EXE 88 PID 5004 wrote to memory of 3968 5004 IEXPLORE.EXE 88 PID 2196 wrote to memory of 2444 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 89 PID 2196 wrote to memory of 2444 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 89 PID 2196 wrote to memory of 2444 2196 9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe 89 PID 3992 wrote to memory of 5004 3992 AnAnkernel.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe"C:\Users\Admin\AppData\Local\Temp\9c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Common Files\AnAnkernel.exe"C:\Program Files (x86)\Common Files\AnAnkernel.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5004 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\del_file_1.bat2⤵PID:2444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766KB
MD55876afe51b248a3672782f8cf91e4018
SHA14d6244a53ce196f7049289b904a763cf4ca0a70d
SHA2569c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
SHA5128bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
Filesize
766KB
MD55876afe51b248a3672782f8cf91e4018
SHA14d6244a53ce196f7049289b904a763cf4ca0a70d
SHA2569c8119840420290b62ab412cd5406fd31b73ba130f859d3a3999153b70870a56
SHA5128bff41d5fc856b0e8f42b673eaf9a33243b717b440437536f2a1bc89c4d6d6cd7611d6ca4bc3b996137c372d2393aa6ece8484985cf4d96b82d2b1e1f5ea456d
-
Filesize
72KB
MD54b93667fd1049edc44df7888773e24d6
SHA145a73a3b4c3e43118c6b264a5dd7d30b6cca4e4f
SHA256f650908d54de80e4cf3a7859efe11812e41e3e4515050434cff904e6a150453a
SHA5127bffbc049906b990c12820afe004b67b32c83a71c6bd36f6222ff062e9bced38a03f6d80e2dd7b269845ddd986b1517b5e136f5c772d7c6c93f7dc4d12bda0b6
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
124KB
MD5a062fbf36321864ac8e7e2e408ff0d90
SHA18cc46a09096eb373e5e01d7547f108eb09bbac9d
SHA256249a27ede8d0fbd3e5dd89b9150d1215c7ae1dc2f137db5a67cee44e6b5c0431
SHA5122ddb24f7f9a6f6b17b4ac3a5e0b4cfe9424a710ef34c7918754bcd4acff8ff41e043c2e8ab829da42d2e4a80cc45b59f309253833ba3d7329ba79d7fc7128819
-
Filesize
406KB
MD56aea0226a87d8d144963ab68b02009ac
SHA16dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a
-
Filesize
406KB
MD56aea0226a87d8d144963ab68b02009ac
SHA16dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a
-
Filesize
406KB
MD56aea0226a87d8d144963ab68b02009ac
SHA16dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a
-
Filesize
271B
MD5ec8426955af4f942359449aca3d39889
SHA19e1bd3b18049480c8381db1ad0b5d2033be84369
SHA2560b171c916f0d50a90ac98f7fd00809d1ab4c1e9ec13ba619377c50c3d51fe10c
SHA512f2dd74fc7a742bc63a762b6db438c97295eab6eeb8f90ccee71ef0c35858680da0d2e9f596ae055701783a794ef98bf84c654059fe237ed9bb51812608578970