Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 13:35
Static task
static1
Behavioral task
behavioral1
Sample
b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe
-
Size
179KB
-
MD5
c8b3199437ab28f48df03778f37902a6
-
SHA1
cc77a38470b68e893d04e249dace3821cb6474d5
-
SHA256
b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73
-
SHA512
031bf40a1f91baf53665e1d102f37bc820dd47f63e18e0a88bb5b6a13ec76866fd0563cc7664efd53e0bb78f33c7e12fb26fb23fb4255ed2eebe7606c8c85570
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
relredist.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies relredist.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 relredist.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat relredist.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 relredist.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE relredist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
relredist.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix relredist.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" relredist.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" relredist.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
relredist.exepid process 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe 3356 relredist.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exepid process 2056 b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exerelredist.exedescription pid process target process PID 1908 wrote to memory of 2056 1908 b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe PID 1908 wrote to memory of 2056 1908 b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe PID 1908 wrote to memory of 2056 1908 b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe PID 2764 wrote to memory of 3356 2764 relredist.exe relredist.exe PID 2764 wrote to memory of 3356 2764 relredist.exe relredist.exe PID 2764 wrote to memory of 3356 2764 relredist.exe relredist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe"C:\Users\Admin\AppData\Local\Temp\b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\b82f2c21851dbbc28c4140767828fbd0744dd78edf663972a445f16e746e3f73.exe--4d10b3882⤵
- Suspicious behavior: RenamesItself
PID:2056
-
-
C:\Windows\SysWOW64\relredist.exe"C:\Windows\SysWOW64\relredist.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\relredist.exe--be6a9ba82⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3356
-