Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-05-2021 12:52
Static task
static1
Behavioral task
behavioral1
Sample
31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe
-
Size
135KB
-
MD5
47973b995f5eafc00c6dc1bf4ccbf22a
-
SHA1
05875466d47aa40ce0d2838640429c7a43e3cab8
-
SHA256
31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8
-
SHA512
6ae6aeb21446b7080249d50ca6f86361b184f9cb3b8d69c48ae7e2abf742cf329ac1093ef8b1dd4427fbde9eb1479abe48724cd46bc91cb54b8652a25b033947
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
repcomment.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat repcomment.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
repcomment.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070015000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 repcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} repcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" repcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 repcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 10c24411cb49d701 repcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections repcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" repcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 repcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad repcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 10c24411cb49d701 repcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 repcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" repcomment.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings repcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 repcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix repcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" repcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings repcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" repcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" repcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" repcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" repcomment.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
repcomment.exepid process 1764 repcomment.exe 1764 repcomment.exe 1764 repcomment.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exepid process 1740 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exerepcomment.exerepcomment.exepid process 1360 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe 1740 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe 784 repcomment.exe 1764 repcomment.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exerepcomment.exedescription pid process target process PID 1360 wrote to memory of 1740 1360 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe PID 1360 wrote to memory of 1740 1360 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe PID 1360 wrote to memory of 1740 1360 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe PID 1360 wrote to memory of 1740 1360 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe 31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe PID 784 wrote to memory of 1764 784 repcomment.exe repcomment.exe PID 784 wrote to memory of 1764 784 repcomment.exe repcomment.exe PID 784 wrote to memory of 1764 784 repcomment.exe repcomment.exe PID 784 wrote to memory of 1764 784 repcomment.exe repcomment.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe"C:\Users\Admin\AppData\Local\Temp\31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\31b5725ee2bcf56a5d8fc973b1afda81af373131df9e4e56707b407f40b6fdb8.exe--1b6b02192⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1740
-
-
C:\Windows\SysWOW64\repcomment.exe"C:\Windows\SysWOW64\repcomment.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\repcomment.exe--ddf047742⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1764
-