Analysis
-
max time kernel
113s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe
Resource
win10v2004-20221111-en
General
-
Target
a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe
-
Size
28KB
-
MD5
76775aa1c565d0181c84a98452a1ae97
-
SHA1
7c0aa367b2e83ca88051c084e335e0e92f301021
-
SHA256
a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9
-
SHA512
8fa2c1deda65a467412cdf80976b0bfca4d6b2483c77bddbc324adf5ad71c284d404b6738e216e73a4f8e62c0fac9f3b2fb1a3ef2d5f0a02c1449e365300613b
-
SSDEEP
192:d9s/XgzmoBE4G0+Z0BCmwJ0TfcikTf9alTFnlhyiHD9y5zXgzmoBE4:dO/wzQvd9HJ0De8vfy4D9y5zwzQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{681861F1-7901-11ED-8538-4A4A572A2DE9} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301cd44d0e0dd901 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004af4e3c1ddb5574288f13e8516257fe60000000002000000000010660000000100002000000055d99b37dd96a60203e6d9d6e4702acf368745ae333966a99a61310fcd76ab0a000000000e80000000020000200000000bd12b661d4740bf7d60fe5d18fc041db32e0245965ab0ba25a155db51cdd1e12000000092c00204787b43e0ed4ee16284361096179cf8f86e0744e8cd7bdb9aedbd4a3c400000000068034f8f57bda2e6fa8d0ceaaef732e0bc955d36f4ec815fb5bdf46497f9245bf7dec71bc21d01375a0d1f60b3f7feb8fa65da675d766bb3ed8bdbafa38a5d IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377493223" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 276 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1908 a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe 276 IEXPLORE.EXE 276 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 276 1908 a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe 28 PID 1908 wrote to memory of 276 1908 a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe 28 PID 1908 wrote to memory of 276 1908 a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe 28 PID 1908 wrote to memory of 276 1908 a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe 28 PID 276 wrote to memory of 1736 276 IEXPLORE.EXE 30 PID 276 wrote to memory of 1736 276 IEXPLORE.EXE 30 PID 276 wrote to memory of 1736 276 IEXPLORE.EXE 30 PID 276 wrote to memory of 1736 276 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe"C:\Users\Admin\AppData\Local\Temp\a6f4093df0fc4651c5056cad0932cfb5aba6ed1bcf817e0d8721320b45fb68c9.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wmvfree.cn/cpa/tj/conimes.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD51d128f4e9564e816365362c28c147b8f
SHA1afecb7696ab161179128f640c9dcb03cea61ad5d
SHA256fa32fcd24c9914ad754bff8b1fd1689e337f448f4415c2f6b4ca9ca1a3b892c8
SHA5128e82612b04d37a16fffc0f3459fa5f0f796667300b1523d0827b6bfec3c0626d4138171f88662c27b9795b186424cef8b553c12ea738cd1532819ff71676a217