Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2023, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe
Resource
win10v2004-20230220-en
General
-
Target
48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe
-
Size
790KB
-
MD5
6ea5a4b23d2a0e9c8b16e2f92ec5e48e
-
SHA1
6062c934748fc59f3365bcbc3b39f2c772e8dda2
-
SHA256
48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217
-
SHA512
57329cfebab311cec5c5b28c855cb27dc8f5bf2b2b45b2f0d9e60b5b25fa02f106195c796d5cbda8d86a253507ec49a237cdba6853796a9af1ca9ab6652ccc3e
-
SSDEEP
12288:AqzXbaUrzJRmKQiKyl+G7LdDy1GPWboTlG4Oe5IWLBv:AqzXbaUrzbvQZyoGXxy4P8oTlG4b5bLh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage\xcar.com.cn\Total = "44" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "44" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage\xcar.com.cn IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA313CA1-BD93-11ED-8AA9-DEF2FB1055A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage\xcar.com.cn\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage\cheku.xcar.com.cn IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DOMStorage\cheku.xcar.com.cn\ = "44" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385032772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1728 48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe 1728 48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe 1444 iexplore.exe 1444 iexplore.exe 824 IEXPLORE.EXE 824 IEXPLORE.EXE 824 IEXPLORE.EXE 824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1444 1728 48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe 30 PID 1728 wrote to memory of 1444 1728 48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe 30 PID 1728 wrote to memory of 1444 1728 48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe 30 PID 1728 wrote to memory of 1444 1728 48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe 30 PID 1444 wrote to memory of 824 1444 iexplore.exe 31 PID 1444 wrote to memory of 824 1444 iexplore.exe 31 PID 1444 wrote to memory of 824 1444 iexplore.exe 31 PID 1444 wrote to memory of 824 1444 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe"C:\Users\Admin\AppData\Local\Temp\48fb5ea7effbebde47b65accd620f99d30582b2b004caa79dfc21b1aba9ff217.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.oneptp.com/ax/?uid=507801&ad=92⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FA0A17BC17FF10008872A7205D0D43E2_608DEF97DFACECDA8E97C6F270153A4F
Filesize471B
MD58e94c67afbc8bc5bf72cae2b7112acb7
SHA1a43bc7e3997d1e2a791baf773db98a0ebc753b7e
SHA2565e0c646415d73dca8ab2e45cf5ae925e620acb6eca62fde449f286fb014ef387
SHA512a3070d5ea87e504b3e6749b52196f2d61f3dd15cba63a47e71f47440c12729b3b32603354028050c324d73c467e68b9ecd56e5ae45629b432ce11425d51ccb94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e629b5d6f5e6ceed22565e08ae3bea
SHA12a2405c057bca238e8825e3116c59165bf3e2631
SHA256e3e5fe3a4e93ab5830c449d3f4c043f656ac8d4a244b68da14e1abafd9535aa9
SHA5126581336822ef3ad7be3b22dd065561531b75de061e262fc2ea3f7265fe190062fe99416677c96836b3a105dbb09e652bbc817f4a772e578014fa2943aa937789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca5ae407f40946711804d6410f2da8f
SHA1c50aaef162247b301ad782852d44fb901b789962
SHA2568d9c2470178885c39fddc48ddc1b76ca4177200976bf2f585d348d98c376adc5
SHA512b7eea8beda843830317c8b35401e90b552e31ddf94e5844cce756e2a455e351cd49145d3f7e23f5d127f85c855cbe980dbc2685e2a9f8da3a5c91b8cd549a7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc69322ecea5abf0ddb2de12be0187d
SHA175c7dc73bce96f3dec02ad5063776e784fcb6147
SHA2568a1a31deece0917e2d0804eb064f211a4619f1d6ecf3823917baffdc1f39ba60
SHA512a3d002cd15765d9c0907c7c2d5b2082508b6580408d012c4dc5c7383c04200f0559d02609716fb0a2427626d6a48f523e72c335204459668e026229edfe0e953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc69322ecea5abf0ddb2de12be0187d
SHA175c7dc73bce96f3dec02ad5063776e784fcb6147
SHA2568a1a31deece0917e2d0804eb064f211a4619f1d6ecf3823917baffdc1f39ba60
SHA512a3d002cd15765d9c0907c7c2d5b2082508b6580408d012c4dc5c7383c04200f0559d02609716fb0a2427626d6a48f523e72c335204459668e026229edfe0e953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e6047872a5ec316b6e6d7cb22abac7
SHA1dfa5db9fde0cc7f46dcc57b4a055e5f08cecfb76
SHA25607302d85089b273bb49d5df0bae033f6f14c0e884fdf627e13841f99d40ab85c
SHA512c48a215d32d5a03c686d3499910163c46644231abd976244965b35e35f51cdc579bd73df1b73e02c8ae62618e6d7ec42e1a89cd1ad22f27a527598ddacc1561e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac4ec51fbd5105553e9ebac3e634829
SHA1dbcc8032de195df2ff8f400e5d30098d78bdf183
SHA256db04c566a0ce162370b43c24a372326b2e8f2da190aea5b65a9a955698b38470
SHA512debcdc790e54c350efef3a68166a709d756199ea8b6ca9d8cad100cf2251d9a14acacea29d0219d84ac86b798184ab7815f1f4fbeee74e2412ca303d3a2d4a4b
-
Filesize
118B
MD57081dacff6be2fc8ca868f013a3894aa
SHA1bb89296c817446815e82011821c76e9c03564ac5
SHA2565a8724aa8275ffa250044691308b67e902bedb25e2120915320cd5b5fd2d3289
SHA512692cc48c47cc9b8945cbf95531d885e5d647867cc5419ae7230da687bce4eb271042a46f239e73d88f04f7cd39170ab8ad8fceac627fd6ce650f2b09c058f589
-
Filesize
8KB
MD524b1d9bda3fc1854a7526a4ab6c65ef1
SHA19283ba03446b95b04378c8f4e179d48ee453e31e
SHA256be9af0832efd3214f74b2f9d87f80c1b4d523b82c4996ea4fd3afd5be227d19c
SHA51253b51716f6517f2e697f9378d6aa64ef64f6292158a911265236636fa44005970641b1e6403d57831f93f702f71335f6ecdd7d4ef5ef3bcaa1493db92d7345c8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\03S7L47X\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMIDRLTB\113_htm[1].htm
Filesize242KB
MD507b76a9119bea5649a1df7658e7bb83a
SHA14ab4e0cb7e1f8005d2dda70c20301368d8119455
SHA25664e0a24d129c9c670261f923a62a9e7f8d5ff56f795b957df2ff43579b8ab2c9
SHA51290386c6bca81060bb80820e0ae94897465b1a475ccf323b7df7e86cf8f615ca75861b13824944850c57cd82972100d928875663771f5777ed3765ff6a86697ea
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMIDRLTB\516_htm[1].htm
Filesize45KB
MD503f41e7fd9fa134aa75494a33f1b421a
SHA17ce2fa27a3fa95d7a5fb14ea87434ebdb6a153f2
SHA25668e6198cec5610b8aa351238fa46cf8f6457e041a7d8a0e85d221b1a389d68a7
SHA51279d33fe43e1b9b827b555ac86e1ee3ef862e668aeadd3c7a1b34b7fa84e91bcba2d6f1c27737828fdb4733672c651c94fb8d2b13f89c6f1dba425f572292b240
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\favicon[1].ico
Filesize3KB
MD5baaf7611a4a89d0821822dbc61cd85f3
SHA120ee71cd9c8ace0490b5bf1be2a0529b0c23b683
SHA256da5ca5a924da32302ecc8c673e7e7f9fd73c25d6c1187d06f610b7caa8af5232
SHA5122780e8f89a5286a9dd5957386836c27bdebd0dc9384a2abde0c079c3f6aa3dac089276d4d4fa7448ae34a5810e412be6004ec8d81da6f5f4c02bdaa1270d8147
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
606B
MD5f156866aa327f23056df56b4a4322efa
SHA17425b1ac619a7f13bab0c50c4682a3e728ed3efd
SHA256325c0f0d6d2af65eff469b620a81684ad26d470556a2683f8317908ed20f2179
SHA512c5958d626989655f1a633373c83987c0019dae90a776205a9a46a6c610dec4de2b56d053382ed64340b732d7852bda69be7fab4b714ef7ae07189bdc926e28ae