Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-05-2021 12:36
Static task
static1
Behavioral task
behavioral1
Sample
a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe
-
Size
136KB
-
MD5
47007e2eea421603c3b5161dbcaaaf80
-
SHA1
24a08f15f4527df9e801ea16646c8121cc5e80d3
-
SHA256
a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410
-
SHA512
e61bf0f5fcfac30e0c52263b7afc9ef56bc65e6e1685091d49b1548db7f19d5704c5d715b9d57b607bb9bba543ff46e0c74bb2db75e851e8ab13c3aa00fff740
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
boxesslide.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat boxesslide.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 25 IoCs
Processes:
boxesslide.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 boxesslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 boxesslide.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad boxesslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" boxesslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 30c41eecc649d701 boxesslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDetectedUrl boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 7095b129c749d701 boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 boxesslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings boxesslide.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections boxesslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix boxesslide.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 boxesslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 30c41eecc649d701 boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 7095b129c749d701 boxesslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 boxesslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" boxesslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" boxesslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" boxesslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" boxesslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" boxesslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" boxesslide.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
boxesslide.exepid process 848 boxesslide.exe 848 boxesslide.exe 848 boxesslide.exe 848 boxesslide.exe 848 boxesslide.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exepid process 1720 a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exea52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exeboxesslide.exeboxesslide.exepid process 1104 a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe 1720 a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe 1532 boxesslide.exe 848 boxesslide.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exeboxesslide.exedescription pid process target process PID 1104 wrote to memory of 1720 1104 a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe PID 1104 wrote to memory of 1720 1104 a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe PID 1104 wrote to memory of 1720 1104 a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe PID 1104 wrote to memory of 1720 1104 a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe PID 1532 wrote to memory of 848 1532 boxesslide.exe boxesslide.exe PID 1532 wrote to memory of 848 1532 boxesslide.exe boxesslide.exe PID 1532 wrote to memory of 848 1532 boxesslide.exe boxesslide.exe PID 1532 wrote to memory of 848 1532 boxesslide.exe boxesslide.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe"C:\Users\Admin\AppData\Local\Temp\a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\a52cbf48bd3feec28384bc758c408e5b849f5a08ac7e680542940bfdb4e3e410.exe--425290772⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1720
-
-
C:\Windows\SysWOW64\boxesslide.exe"C:\Windows\SysWOW64\boxesslide.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\boxesslide.exe--7e478e4a2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:848
-