Analysis
-
max time kernel
63s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe
Resource
win10v2004-20220901-en
General
-
Target
1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe
-
Size
2.6MB
-
MD5
073a987315ab40e571fc5dd55ac8b976
-
SHA1
a54d30bc55ff30649c6afa78a8b58ea84dd88123
-
SHA256
1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703
-
SHA512
6d8ab7a90c86c91f357d5b7a7d1cf2a582be08b66f8f7153533b37e8c33ccbb5b9b26df365f0f880530e86b974f09d198cb803cd570bed62a76d7cf21aebbe5b
-
SSDEEP
49152:dukwYuIrMlSBip4TZaqdwk0c05HGid+s8KuqGaX0ToIBAUZLYK:UBYlZBip4YqdwkLcHHWJBAUZLB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0001000000022f28-134.dat acprotect behavioral2/files/0x0001000000022f28-133.dat acprotect -
resource yara_rule behavioral2/files/0x0001000000022f28-134.dat upx behavioral2/files/0x0001000000022f28-133.dat upx behavioral2/memory/4972-135-0x00000000114D0000-0x000000001150D000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4972 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe 4972 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\4399.com 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.4399.com\ = "126" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\4399.com\Total = "63" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\4399.com 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\4399.com\NumberOfSubdomains = "1" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.4399.com\ = "63" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\4399.com\Total = "126" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\International\CpMRU 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Cache = a803000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.4399.com 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4972 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe 4972 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe 4972 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe 4972 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe 4972 1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe"C:\Users\Admin\AppData\Local\Temp\1e439f14f3193e0846c5d35d4a066117e065759a7eecdc840347aba37d67a703.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d