Analysis
-
max time kernel
97s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/04/2023, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
start.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
start.exe
Resource
win10v2004-20230220-en
General
-
Target
start.exe
-
Size
12KB
-
MD5
1df9e9acc548902abdbb2f5c5df3e93d
-
SHA1
f235a21d075d79c2858b3daf090c6349e366f217
-
SHA256
2a181b6674118d23e18f8d95e46f0149a12bb5c41a4b0efe3dea60fa35880bc1
-
SHA512
6ecac4c480409ca3dd835b8601c3f3e3d330e9f9a6e9a683867ae804f6ae47469df4a23fa253dc032292871f14cc4240be6f70fee4134e56d5f19882d190e6f2
-
SSDEEP
192:VT3fvS/Q10wCWXyY7ULerKBbPbqvv5+iAsAVesQ5tfMc3K:NHS/Q10wPiY76KKBbPOvRsX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000f4def873e1a0fe3d4c7da4a2025ed7c9c367fb578375c153b1575162f1912c61000000000e80000000020000200000009f4ff757f3a3a31b645e8ebf4bd608c5fd830df4d26f8b41944d655fee81cab0900000005b198273cac0f11f9ae9d28ea5a9ff4ce028ddf0568212482321adc34fa8a941a4171f86a7a0de24ee4a84762fe9ea905c6b9ea371fa0359cd611b12f75e4a42e3c313b444b17ee21a342cc64008d040ebc7bf5b227eca182021880f5491deb719073593a33c50a5950ea02e41b82bf4be6b1a618b3f5bd29266e07cad5ef577945daa75b84f0654a296681e9ba4829c40000000114f88e4457ad168c37d58aab5534ff3e5b88f187da75ecec26ae72f8a20c823f27a0f735e17a9da7b19cbad6d8a8ca2d6cbc4c3ba51464f0e8b0be5f26f00db iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{838010B1-DE0E-11ED-95B4-CED2106B5FC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0537c5e1b72d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388603918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000208c49e42cf1fc2fcd52db9a8a446452189cf36ad2c02dae02f3d98154dbc661000000000e800000000200002000000039a28a56f0da66a1f6059498e9ecfef663929ee65189059e69176f5fb6be19ab20000000da55a5f68681d519efed524d579ed83de030d712710dbadb147d1112d09a0546400000005d2e42f0165049cccf9f5596debb37a202bf4a7d52b1a98793b9c278d50f4d0b3eb11c6aca2a3e6efd3ba522e7f54bfdb1dd6ea40563140fd3faff64bafd3e14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1104 iexplore.exe 1104 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1104 1232 start.exe 29 PID 1232 wrote to memory of 1104 1232 start.exe 29 PID 1232 wrote to memory of 1104 1232 start.exe 29 PID 1232 wrote to memory of 2032 1232 start.exe 30 PID 1232 wrote to memory of 2032 1232 start.exe 30 PID 1232 wrote to memory of 2032 1232 start.exe 30 PID 1104 wrote to memory of 1496 1104 iexplore.exe 32 PID 1104 wrote to memory of 1496 1104 iexplore.exe 32 PID 1104 wrote to memory of 1496 1104 iexplore.exe 32 PID 1104 wrote to memory of 1496 1104 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/leshashved2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chunk.tmp2⤵PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad01b693c570f963748a0287fce23a6
SHA13f95916536e5e0697f1ff3582ca2e57b549eeab7
SHA256b49ff002c374d37fd861e04fc7d7448ff2ba26dca932d07fd4d09cbe3148f5d3
SHA5120aa758366d061865f6460fc7d1aa828045fb400088ec6a32b51e83057608b351e542e7d16abd59372445e1a59014b9638eab9e8742a77fe8638811497d7ecc20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d5c2cb9ec5a0ddef00cfffd8053daa
SHA16dab28706656232a01a79f11dcaa62ac2d4e6cd6
SHA2566cb3645a5c90052edee13694e41a0e0f75100f6c8f6aadab98c1a6fa8595dbe3
SHA512b7159c410c3093ede522aaa293e7d885eb163d6d58af66ab8db61d7f45801fafad3e8268df811057cd072a4ebe311777a0a002bbc0cee9d11aed03c6e87a08b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d58fa9892fda33551454f6203f12add
SHA19b2c21fc2ab458c1cc6045f3effb634ec7c27ba0
SHA2566448b502e4e61e128e2f6dbf5a68ddec01f475d4a111b09864d2b63e628d0a76
SHA5125b0021024c593a379de6dd456739baa42b33cc48423e93b624c50cb7fec5bc2d0d2a749ab9a2714fc6ac49886e82f39061402dddd6c67dce84646f2769c08539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929c229b77bc221b93d78de5fce9881e
SHA199d56f2f98d57c72765e31d71cbc15300a61788f
SHA25680bbea9d56c6bb75db071649babe2fbdc322acd55ee47c0e1a926783e3e8ada9
SHA512cda5798c04f2b46af91f94d942d7cf6f70ddc0b69ec1a8dd68c9495fdd6b3cf23529813f0271a9fe6a41c5c2e83e676063b34461cf7adc535d794293737775de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6b4d95f21e5e10089aca0aa50554aee
SHA1b454c871952ed60e942d14e7e957648d2da06a37
SHA2561461e3efab63ae20120807660c7ddfc46f77ec1eed0f1077f38e02a64e94dff0
SHA512402f512f923033a909f94b7ef4ff104126cbf159126371c04bca196623763ad535c05867d489b064349303cf4df761efc2ca52ed2ad8a36022b550755af659e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af59a5cbf20be117ccd8d2b8c4f71c79
SHA10aa63acf0074d84cb4c664b24c8fd62dd8df0540
SHA256b0456d2fa16972d3a8debc1e5fbdda5b11b177bfc9d136a37edb290b77644473
SHA512e788e315bbe61b70922687d95067337602ecd905ebaeffcc52f49768e118f6b2a53953165d2f2f2a0906f95a43be7fc5c65d8a14a508e66b8fa62bf6e1ea84fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592fc9fa77001f48c36e5c439aa0e7d89
SHA15bed2fab04e461dd9f1ad4073d344f2059fb6ec8
SHA256f43b5dcab06a9beb4b4ea384f3a06705709f6216e912460cf3d3335e36249550
SHA512dfa6b30a63dade4886c46e96127890c69520fe035e87818a69195ad6aac730272071caa63fa1b56574eb8e67bb7b2792afabd695b404cf588e309d5251566b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9ef84c676bc40e45aa6a9c42946c30
SHA1737bf826156e2d9feba980505fb2edcaee808b97
SHA25614ee28244573074475741c6772a2ba0e423260618ab29398ad57af829dfa396e
SHA512ebb59559e5553cc9320f603993dfbe323840d20fa2cc00946c29423988a971373807f8fdb12ce1f8e34f1e13d30e1d54d222fc14f7aef51d86c3ee9327ddb16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cccef7d0afc36910476f342f2ede77ee
SHA10f2832f13be6a4b56fd113a95ecb62cbd65c0cc2
SHA25673dd52f196b28b90130ef0eb1a2eaa99c1dde25cfc30940cd3e7a865994c62cd
SHA5129d52dad1aa8d2708aa64339feb0ab4119c8594c35072485f54cb08a3515c7c58e90426c4d8a5b663712537347f505457639cd32901b21404b46199f370385852
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
600B
MD5313382dc3c31546fb9ed929ff2cf7a03
SHA1c2a58e4e3fac46f9d256223d03140bd80ccbaa17
SHA256f203a07e93f13abbe7be271590e0e20e60eda13b73417af668642729b10ca5e8
SHA512ae96ce7b632f44e1e26b82ccfd40a5bb91891dc293de9e5f00338834bc6c61aad0a88e49663c52132f4046b8a8baf70abd6076883e25a28e54b0c888718e2b7d