Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-05-2021 11:24
Static task
static1
Behavioral task
behavioral1
Sample
e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe
-
Size
448KB
-
MD5
684ed792f2ae26e0fbfa34ac1cef5f40
-
SHA1
a687998b7ad3624122e3bfc1ad5f343cd9b33af2
-
SHA256
e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb
-
SHA512
0e8a276f32f8184319b2128cef4452be68afda40df17dd9eaf965b98d4cca71b39225edadbf9d82149171c73e35e04f4155e3e644b41805094e3d6822e28247a
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
wbemallow.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat wbemallow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exee6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exewbemallow.exewbemallow.exepid process 908 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe 908 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe 3556 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe 3556 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe 3988 wbemallow.exe 3988 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe 1996 wbemallow.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exepid process 3556 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exewbemallow.exedescription pid process target process PID 908 wrote to memory of 3556 908 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe PID 908 wrote to memory of 3556 908 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe PID 908 wrote to memory of 3556 908 e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe PID 3988 wrote to memory of 1996 3988 wbemallow.exe wbemallow.exe PID 3988 wrote to memory of 1996 3988 wbemallow.exe wbemallow.exe PID 3988 wrote to memory of 1996 3988 wbemallow.exe wbemallow.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe"C:\Users\Admin\AppData\Local\Temp\e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe"C:\Users\Admin\AppData\Local\Temp\e6c95255a8926b0f99d7b83bd00b7062bea8e815838e7e8cda471edc32253ffb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3556
-
-
C:\Windows\SysWOW64\wbemallow.exe"C:\Windows\SysWOW64\wbemallow.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\wbemallow.exe"C:\Windows\SysWOW64\wbemallow.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1996
-