Analysis
-
max time kernel
118s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14-01-2023 02:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://presercist.blogspot.com/2022/10/presercist.html
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
https://presercist.blogspot.com/2022/10/presercist.html
Resource
win10v2004-20220812-en
General
-
Target
https://presercist.blogspot.com/2022/10/presercist.html
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 48efb34cc027d901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002158dd6af51cae4fb1b850252096024400000000020000000000106600000001000020000000481d15e4dd3d69dadb56c25bbad17e36e521f3a56af0da58e9d3a514bd82dd35000000000e8000000002000020000000a20502b2aff996a6f85da3ec197164e5760b8491e87437b8ca8ace8655b3218620000000d0fb338a8c84525e93396cdcfdc30ed43639e64d308ee945e02b7bf00e51c77d40000000fe5f32653c4ae6ad946b2cf574994777e4be50a1a8aad2c63bc12a96f0ca768040e77d8c3f42b37084dc95df66809cd0682ed1983100bed2a18afc73f226e094 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A62D911-93B3-11ED-B7DD-7E0305A911F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a0cc34c027d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002158dd6af51cae4fb1b850252096024400000000020000000000106600000001000020000000dc0823348bf2ee27b8990c81aedf4df080edb7b2b866bb31fc408e59ac75a67b000000000e8000000002000020000000e8d3fb3554f0fd58c5f2d09f78b39e1c123af69b3d81f933689edbcf142ba63790000000aae46d87348c9efadbca746f2bc331596895030ca7505beabcf65f38bceed2372169aa9a1d66b5b2824a7be7d2e2a4e08940efdcf9622a60613a027754c629425b6bb408a545227786f762fa2b0b1cac22d94cdfda6787216239843049b03b0f378744eeaeaf00495868a1b00bc777a90dae75e399a9763daf30c7ff9bc216a375b5767e078634cae876fc83c74efd0b40000000fcafd05835a0de7f0f83237b08318e0b251d3fa79864b988aba6ef9cabb2c7e9765871dd9e2c62af5be8e58fc9ecc3a5c6e0109f019a609d3e072e07b29d8afe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "380428379" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1220 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 360 7zG.exe Token: 35 360 7zG.exe Token: SeSecurityPrivilege 360 7zG.exe Token: SeSecurityPrivilege 360 7zG.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1256 iexplore.exe 1256 iexplore.exe 360 7zG.exe 360 7zG.exe 360 7zG.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1256 iexplore.exe 1256 iexplore.exe 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1220 1256 iexplore.exe 27 PID 1256 wrote to memory of 1220 1256 iexplore.exe 27 PID 1256 wrote to memory of 1220 1256 iexplore.exe 27 PID 1256 wrote to memory of 1220 1256 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://presercist.blogspot.com/2022/10/presercist.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1220
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\Presercist.rar1⤵
- Modifies registry class
PID:2008
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap551:82:7zEvent92221⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c9d3dd211c138707b462297cac70f73
SHA19935585d56bf63154be2fe02f53760ee7faf8ffa
SHA2567b885e0a2fbd7dfbd4f7c3cc4afce8135dbdeead81be8625ec1c30a39aff7e97
SHA5128e525b772d63ccb4cbef564a402078ce5d3f6dc3842944b3a380ac372b7d533e9aa00c83def3fcb3947993c705cd82328d4490692cb7d262d0de67fa245f4133
-
Filesize
8KB
MD5f0bd624b9b206ddf8cb89bd06661cf79
SHA1ca5f1c254c1a97b5925961f0222294ab8b007acc
SHA256bae7b435aee17d737d101d5ef9652445f31316d7ffd41396d23bbbe565c1704c
SHA512739c78db35fc6fed796e32345cd0ad932389945f567057bf244648c9067aff85471f53b21d6bea5a72b1229c1f7086d0152b076eff1e58f1be019599fc4f5cc7
-
Filesize
608B
MD50fcde7d05ed3c49ec70e00e0267cdc34
SHA18f3fad816a8cb2de761423c2bcfaf8ff7adb44a8
SHA25642891b9cd3f29524223aa5f411d44c12bf85d15b9dfdc30b6d78821eb9bff244
SHA5125b92bb65a3b5f67903b223d6ed7e1a9dd423e2e8e8dede657675268b4b1b562c3b5d5aa2c0e5863bcc9450a0fdb73a1e9480548c1637396eac43d0fabadc76bf
-
Filesize
21.6MB
MD54869fc57cfb4a974f4266893da3ad114
SHA137fef8fed4be2d505bc1594638d678fec8b58a9d
SHA256d79e71678bc839cd3063a8d65cc6c66a041118ee1eb820f334036c0f2d88371d
SHA51232fe5c1d45330e84caf0da09f126b34b39c39e38d9d340f639105f3b6207f85c14c381275fde8b375a1ed4d6ee8e98a012f3be6d5d971d6e43883ced18d4f81a