Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 19:17
Static task
static1
Behavioral task
behavioral1
Sample
97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe
Resource
win10v2004-20220812-en
General
-
Target
97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe
-
Size
113KB
-
MD5
ccaacce738da55bef3923652a00e0513
-
SHA1
ab13b8eec27d0d5112575b9308e247e2f80d6efa
-
SHA256
97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c
-
SHA512
a5b4fe0a5f25dcb4eec42c59b9f1e8f9043cef4603b70489e88b362700ae2e3e5bc6e2068469bdc2e1b92f019acf58338327348d0b2997e656e13b2517e6bbc9
-
SSDEEP
3072:hdypzwl22/lU8QKTvOucjZukl8R5wNdcG48ES:hdypklzi8QoOz4XIh4I
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Internet Explorer\IEXPLORE.EXE = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE:*:Enabled:Internet Explorer" 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe -
Executes dropped EXE 1 IoCs
pid Process 3844 msn.exe -
resource yara_rule behavioral2/files/0x0007000000022e5d-134.dat upx behavioral2/memory/3844-135-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x0007000000022e5d-136.dat upx behavioral2/memory/3844-139-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run msn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSN = "\"C:\\Windows\\SysWOW64\\msn.exe\" /INITSERVICE" msn.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\browser helper obJects\{73364D99-1240-4dff-B11A-67E448373048} 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\msn.exe 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe File opened for modification C:\Windows\SysWOW64\ipv6monl.dll 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe File opened for modification C:\Windows\SysWOW64\msn.exe 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe File created C:\Windows\SysWOW64\hook.dll msn.exe File created C:\Windows\SysWOW64\ipv6monl.dll 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3844 set thread context of 4892 3844 msn.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2252 4892 WerFault.exe 82 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73364D99-1240-4dff-B11A-67E448373048}\InprocServer32 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73364D99-1240-4dff-B11A-67E448373048}\InprocServer32\ = "C:\\Windows\\SysWow64\\ipv6monl.dll" 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73364D99-1240-4dff-B11A-67E448373048}\InprocServer32\ThreadingModel = "apartment" 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73364D99-1240-4dff-B11A-67E448373048}\InprocServer32\Enable Browser Extensions = "yes" 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{73364D99-1240-4dff-B11A-67E448373048} 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73364D99-1240-4dff-B11A-67E448373048} 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1932 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe 3844 msn.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1932 wrote to memory of 3844 1932 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe 81 PID 1932 wrote to memory of 3844 1932 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe 81 PID 1932 wrote to memory of 3844 1932 97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe 81 PID 3844 wrote to memory of 4892 3844 msn.exe 82 PID 3844 wrote to memory of 4892 3844 msn.exe 82 PID 3844 wrote to memory of 4892 3844 msn.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe"C:\Users\Admin\AppData\Local\Temp\97a57b6781186991194ff52dd6174320dbd3bc824758a5291773b3cdb7576b5c.exe"1⤵
- Modifies firewall policy service
- Checks computer location settings
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\msn.exe"C:\Windows\system32\msn.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\svchost.exesvchost.exe "C:\Windows\SysWOW64\msn.exe"3⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 2044⤵
- Program crash
PID:2252
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4892 -ip 48921⤵PID:4904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52d73cdb097facfb6d564d1996b18df15
SHA1e9cf0c7bbbd0e4cbd3e764d555795cd106e72514
SHA256db6ec2a330003f1746ba8a00efed2bc7a0b532dc61dc24849956702fccc13ca6
SHA5129644dc79202bc8a933266249afa74f8a564be6bf19c76833e22500cb349266fc0c23c0f8960a1add75112790a45a312ff5869f829b342522e5d343f2e58a457f
-
Filesize
14KB
MD52d73cdb097facfb6d564d1996b18df15
SHA1e9cf0c7bbbd0e4cbd3e764d555795cd106e72514
SHA256db6ec2a330003f1746ba8a00efed2bc7a0b532dc61dc24849956702fccc13ca6
SHA5129644dc79202bc8a933266249afa74f8a564be6bf19c76833e22500cb349266fc0c23c0f8960a1add75112790a45a312ff5869f829b342522e5d343f2e58a457f