Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2023 19:32
Static task
static1
Behavioral task
behavioral1
Sample
42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe
Resource
win10v2004-20230220-en
General
-
Target
42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe
-
Size
2.1MB
-
MD5
88bf60d3a425bb68de8ad4d32417b3e2
-
SHA1
4e59f5b4c6e279d15d7ff6cd65ae3b12ff480078
-
SHA256
42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd
-
SHA512
a96d4f27b532fb51c29f6c815a7c9fafb1847923b5016bc5712c7680eb11ab0bb6f1610fc56b8a0da20b74c5fb6fb0c65d9898f973393f0d7763d13d53108469
-
SSDEEP
49152:bzy0qcLCVWBorny6Sd9VXnlhNoME4G89:bz9hBwsDXE4G8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395168194" rundll32.exe Key deleted \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TypedURLs rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Cleared = "1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Cleared_TIMESTAMP = d0527b4f3d72d901 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395168194" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1204 rundll32.exe 1368 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1204 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 30 PID 1308 wrote to memory of 1204 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 30 PID 1308 wrote to memory of 1204 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 30 PID 1308 wrote to memory of 1204 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 30 PID 1308 wrote to memory of 1204 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 30 PID 1308 wrote to memory of 1204 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 30 PID 1308 wrote to memory of 1204 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 30 PID 1308 wrote to memory of 1368 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 31 PID 1308 wrote to memory of 1368 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 31 PID 1308 wrote to memory of 1368 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 31 PID 1308 wrote to memory of 1368 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 31 PID 1308 wrote to memory of 1368 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 31 PID 1308 wrote to memory of 1368 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 31 PID 1308 wrote to memory of 1368 1308 42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe 31 PID 1368 wrote to memory of 808 1368 rundll32.exe 32 PID 1368 wrote to memory of 808 1368 rundll32.exe 32 PID 1368 wrote to memory of 808 1368 rundll32.exe 32 PID 1368 wrote to memory of 808 1368 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe"C:\Users\Admin\AppData\Local\Temp\42e4def6476d318a9bfadd9ce84cf1a6fddd7950c8b3418c2e3bd1f2ce5afdbd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" inetcpl.cpl,ClearMyTracksByProcess 82⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1204
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" inetcpl.cpl,ClearMyTracksByProcess 12⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationList3⤵PID:808
-
-