Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 20:01
Static task
static1
Behavioral task
behavioral1
Sample
87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe
Resource
win10v2004-20230221-en
General
-
Target
87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe
-
Size
272KB
-
MD5
5be81b5eb603367df58dc1aa89504526
-
SHA1
215a6f27fa611c8dd9f727e861c173479a20d23d
-
SHA256
87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee
-
SHA512
21d01cace75b78835283f2f181fbf1201f40f260cbeaf9fab3b3646f3dc44a7ce44d3e9f9bbecb3a46f4bf03db3b499331fec2eb9a652cbdc3752e1345c4546b
-
SSDEEP
6144:B7tY0d2sm1gHdJS/VS4LZlCcBAZKg/VSQysY:ptvdvognSxL0KYo
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\IESettingSync 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe = "11001" 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe 1412 87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe"C:\Users\Admin\AppData\Local\Temp\87d6557b0640677a74128811b59d31c690beacd84f014cace9b8170c29050eee.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1412