Overview
overview
3Static
static
1System Vol...ps.zip
windows7-x64
1System Vol...ps.zip
windows10-2004-x64
1System Vol...3.pcap
windows7-x64
3System Vol...3.pcap
windows10-2004-x64
3System Vol...f.pcap
windows7-x64
3System Vol...f.pcap
windows10-2004-x64
3System Vol...f.pcap
windows7-x64
3System Vol...f.pcap
windows10-2004-x64
3Analysis
-
max time kernel
58s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
System Voleume Information pcaps.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
System Voleume Information pcaps.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
System Voleume Information pcaps/43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
System Voleume Information pcaps/43499bef-a2ad-4719-aaf9-c2a03b2fa5f3.pcap
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
System Voleume Information pcaps/d85b28a3-e428-427f-9728-3e39f7aa2fdf.pcap
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
System Voleume Information pcaps/d85b28a3-e428-427f-9728-3e39f7aa2fdf.pcap
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
System Voleume Information pcaps/f2e83873-ad5c-4abb-b0d4-e3b752b1f46f.pcap
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
System Voleume Information pcaps/f2e83873-ad5c-4abb-b0d4-e3b752b1f46f.pcap
Resource
win10v2004-20240426-en
General
-
Target
System Voleume Information pcaps/d85b28a3-e428-427f-9728-3e39f7aa2fdf.pcap
-
Size
11.1MB
-
MD5
bd927203defde0842981678259a9520c
-
SHA1
b66718fcad76d585648354a8b98373dd65c26130
-
SHA256
6c22e38abbf5424eb8f7651f0d1a33e4c03c53a94f09b8f6534282ac3efcf3d6
-
SHA512
1ba33b118c27aa117606c574b4ca423727bbce7a8f1862456866d8dd3a78f1009436f83f369b121a8c98ceba8a6eaa81c91bc3efdc573e3094b77aa180c76382
-
SSDEEP
196608:mVvbg8fEmUoOsLX/8MyHf3CZn4i6yEZjrtDCRe9XRogeARYwwXPARszpFteSdF/B:m9ghmAsLPPKqm9HHv9ygekYV1dFteSDB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 7b9d822a7ba1da01 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{68EDB48C-8D10-4ED3-BFCB-C6CE4D3B26EE}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{315A8497-186F-11EF-BCA5-F2AC8AF4D319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2900 iexplore.exe 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
OpenWith.exeiexplore.exeIEXPLORE.EXEpid process 4816 OpenWith.exe 4816 OpenWith.exe 4816 OpenWith.exe 4816 OpenWith.exe 4816 OpenWith.exe 4816 OpenWith.exe 4816 OpenWith.exe 2900 iexplore.exe 2900 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
OpenWith.exeiexplore.exedescription pid process target process PID 4816 wrote to memory of 2900 4816 OpenWith.exe iexplore.exe PID 4816 wrote to memory of 2900 4816 OpenWith.exe iexplore.exe PID 2900 wrote to memory of 2552 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 2552 2900 iexplore.exe IEXPLORE.EXE PID 2900 wrote to memory of 2552 2900 iexplore.exe IEXPLORE.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Voleume Information pcaps\d85b28a3-e428-427f-9728-3e39f7aa2fdf.pcap"1⤵
- Modifies registry class
PID:1224
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\System Voleume Information pcaps\d85b28a3-e428-427f-9728-3e39f7aa2fdf.pcap2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:856