Overview
overview
10Static
static
10TekDefense.exe
windows7-x64
7TekDefense.exe
windows10-2004-x64
7index 2.html
windows7-x64
1index 2.html
windows10-2004-x64
1index2 2.html
windows7-x64
1index2 2.html
windows10-2004-x64
1index3 2.html
windows7-x64
1index3 2.html
windows10-2004-x64
1ransomware.exe
windows7-x64
7ransomware.exe
windows10-2004-x64
7tekdefense.dll
windows7-x64
10tekdefense.dll
windows10-2004-x64
5Analysis
-
max time kernel
100s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 09:37
Behavioral task
behavioral1
Sample
TekDefense.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TekDefense.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
index 2.html
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
index 2.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
index2 2.html
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
index2 2.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
index3 2.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
index3 2.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
ransomware.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
ransomware.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
tekdefense.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
tekdefense.dll
Resource
win10v2004-20230220-en
General
-
Target
index3 2.html
-
Size
1B
-
MD5
c4ca4238a0b923820dcc509a6f75849b
-
SHA1
356a192b7913b04c54574d18c28d46e6395428ab
-
SHA256
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
-
SHA512
4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEDBAD41-CC93-11ED-B2AF-D28FF4BEF639} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a15c95a060d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dbb59ddc676e394a83d3f942d26f43ca000000000200000000001066000000010000200000004ad2aaab684880d961898f8c8722b5fdc80578615537487287e1dc745748f3ee000000000e80000000020000200000006d0c41a3bc6b6c108a0fffdada35f017d389c9af48fc18b3f4e0554034ce90d6200000009b6d6fce57827200deae2f4390ea86e1a85982da69e515933442891f8d80b6b4400000001af491f489810bf60e505c175e5881624b9999559e252dca48b3c7867bba48a8a158b3c791d720477f8ccbeaa1517faa1a9c03a2735251fc9ebd1931f8b19bed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386682020" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 776 IEXPLORE.EXE 776 IEXPLORE.EXE 776 IEXPLORE.EXE 776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 776 1680 iexplore.exe 29 PID 1680 wrote to memory of 776 1680 iexplore.exe 29 PID 1680 wrote to memory of 776 1680 iexplore.exe 29 PID 1680 wrote to memory of 776 1680 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\index3 2.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD576f399763db2fd10dcf8e1188e36ddcd
SHA17af254bdaab8818bd2088991dbbd4373a92bc9f3
SHA2562a7add1aea9818bec0dd0677aad716f6171a20bdbf88c393f86bc4f099b7e309
SHA512207e45e10641ab26d6c8ac5afb7300deef4a7c685d551e7b675d1ac6c6954d968a0695e18b12195812d7f117787d209e83cc6ddab3d147bede9437fe9ae3bf21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5f887b856cb207b7eafbd6b73220343
SHA1df6eccc304ec06489e249d2901032b4e8b538207
SHA256737b630f4a36dc4dff18928830ccd6a2862dbf2fc315ab24057711f8501ff01b
SHA512143295ec90b8fe35c3000c4cf4fd1a0dccff0d9556396976586ca100c34161e58ab406e797007e6430c9d6b8eaa3103b76ce1c596d70c1a63eebb7c5448af305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57838bfcebd4d35bc313d0139a6c9e9f6
SHA1ba17e8974946eab2fb9bf8fb08741b4e88bd2a13
SHA25610e357ecb6a05f6992c89cb1d12e1c9a85ea71e0b308858a597b1eded709ba83
SHA5129d070d75a20ba619a9bc37561eb8079ba9cb51ee46d6d37db0e6dde710f50fa2ca6ee9baad4e71793623ccc2a4d1ffaca0e2d1937d38e1fb653ba903cd2c617b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5467f0d4ff8e26e9408cb65ae014fae2d
SHA178a06491e7eeb6c166792028ba02caa849c97b6b
SHA2562da7abf5bf3956e1cb10921e371993e1ddd8f3179c012ee129ba58f9dc163da6
SHA5127bfae057bcfe33b669a30bd5ccbb8146fa26292a923ed8d084948c2b3f83407e63ddb90916fa615b242b62e3b046dbc77fa1cbd7c2be97675ed6876594dff238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3ec13b05c204889a0ae6b7bf13e9076
SHA126cf8d3ffb85fa2d06e922463ed780659874f1b3
SHA256373d396cbc6a11929fd720b2da2bc2d744ad223587c0b210bbdb1d58cb6f8c43
SHA51222ebb87d739645c41c89bc1ca51d16ca781cfe91033fbcaeb1655b397bcc4a51243e511a871263a797cb6bae161f6e2031c81dad2825958b81bc6ed3a9046e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD508167868c0064cbd034153b9856b7d55
SHA1c1091d4a1a5aa83c97aec593f276fb404ba073f6
SHA256d46af8913963d125a5b7c1edab69124b88d26a29ba6817931f629d6faca9d118
SHA512c5a1b2122c2cc3d508154df38204b29929887fba287a4ee6a1f6769c83bef925046c00c981e2e7c252b6206ae648dbfb95e34f335cd2cb5f400725530159695e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559c0c769fdc4f998db1296e4115f257d
SHA16bfb52359fffca0e22c6eb3a73c125db92436bd1
SHA256b5fc08a4b1d0efcd9642757a04ebe19b2ee8ea42cbacc7c5f9c3d2648976a9ef
SHA512766fe3e5b8e6b18a7bf0025c134c707fa90b1f4b8c01e9c48e9fe06c234dff100793b6cb74918f53c18fbe9e8b6a62fa9d60f34fc442c6a29470c55ad24826d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597314416aa95abcd7fde6363df75d6ae
SHA116c79b29e7235759c8bfa6138dfe166339a3f3b7
SHA256a11361c658f14ba2a42d9ddb5fdf3ef9e7bce3a2c2b73a4ed3b1c946de898991
SHA5125bcaf343e0160c4726574c54b5bf3d8b4790f725c79939a53694256521baa323a6de557418e3542864e0952046c4d3780885cc47f9f762f19d926a946d09ba48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f60d479d027c0c440c824267ebd42bf7
SHA1b7c373977fc7754e49110f5e7114fd7c654aeef0
SHA2564b33e296b9516cadacba3f0976b75052c4875aff696b5b755c453c772a683520
SHA5127f4383ef17201973629d7b57892f2fe412da317b41935b7a2a95542a352b489e49b438cc2ec75ea5563fce4f8d55940b493c7298f1760851db625a9362e8f23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e182079772468c441af8c906a93cf382
SHA141cb5182db4b498dc03a4b3653f45b4f17215af7
SHA256e054e99b571aae50c6887b8e44b2cd3aa8a995a33a9c80a7cd7d11b3c7247257
SHA5125c6165c311dff6f407658fbb04f4ca5c885b456eb2adc8af485e4079850258eb3b5c0e03ca96dfafcbbb108fb1de56b5b657afa4d619b33e12883ae338acc44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8e20baf6e9cb6baf726bd87b17e4955
SHA174ab07fa1dee8713d201397c04ec0f0f75c35e38
SHA256ed0691dcbc0f6ab2d33333053f2b0fbbcf3b16194fee10f1b187143adfd853e1
SHA5127ff1da73ef7cdc3619526e7183c71e8947e0aeed3979345d039f2ffe471d7c9b8c780b4c6b6d5caa82497dc0921fefd76a046ffec015d765ddaa8d00d1a0543f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD544b24b589aa684819f3ed71c310f4ef9
SHA1507135a59691d262e2c059aef1be3843f9474efb
SHA25688cd2857df845cafdd69dab9a8f32585e947759892467bb074edcc55331435d3
SHA51270b2bb5d3b3d03917d130179694774a4059d97fe2421af18569c42659414fd0a19889adcf20ffe981d906557b7a8dd6f5e456ca48572fac7fafbc46ce2bef219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f84a73752cb59485cfe386e8650c158
SHA1be5176be41fcd68928adcc4d9fcb4e1fae5acc2f
SHA25619907dc2ae7ee46b2509cbccb7bc8cefb778a1a0180d19fdfc438ce2263c2ddb
SHA512db4d339655b1c73d5dc4bf39f3c44c3a49d1dd21e6ee1902b1af9a3490fbc563e7649a4ceda0132da530659a8556b7c61df4e1aa2bb4507ddbbb9136659e9319
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S7FIT0B8\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
598B
MD56db3b4f064983d52d091203419d0a0fd
SHA1d1a076d14a0bc87e076d47b2d95fce069d2d1570
SHA256472afd9e97850e1e01c4b3bec8552c325cd454e1363bfe06052651115c0e8645
SHA5124fa4943fbf3a518262e2f775863ded03874ac789c3e5cb902d0ee77a64d08b542c27a449ee49b39250b47be3402fa78a73dc8310fe473fca01343902f5067c9c