Analysis
-
max time kernel
132s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-05-2021 02:00
Static task
static1
Behavioral task
behavioral1
Sample
ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe
-
Size
170KB
-
MD5
5b5b849bbb349fea02d69a076302ddab
-
SHA1
3ddb25d728b7cce43d1948433c27a67cbb6c0ff7
-
SHA256
ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7
-
SHA512
30dd4c08c617cff339b4d235ff0cd72568bd77eeba85a37dd360d2283f56814b0d7088ed810cff8d09e005025aef802e50f4960b780c0be98ca62b43576dbeb8
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
unpackhotspot.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat unpackhotspot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
unpackhotspot.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = b0b0d2c85f4ad701 unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 unpackhotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" unpackhotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix unpackhotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = b0b0d2c85f4ad701 unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings unpackhotspot.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
unpackhotspot.exepid process 600 unpackhotspot.exe 600 unpackhotspot.exe 600 unpackhotspot.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exepid process 1744 ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exeea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exeunpackhotspot.exeunpackhotspot.exepid process 1084 ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe 1744 ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe 1768 unpackhotspot.exe 600 unpackhotspot.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exeunpackhotspot.exedescription pid process target process PID 1084 wrote to memory of 1744 1084 ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe PID 1084 wrote to memory of 1744 1084 ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe PID 1084 wrote to memory of 1744 1084 ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe PID 1084 wrote to memory of 1744 1084 ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe PID 1768 wrote to memory of 600 1768 unpackhotspot.exe unpackhotspot.exe PID 1768 wrote to memory of 600 1768 unpackhotspot.exe unpackhotspot.exe PID 1768 wrote to memory of 600 1768 unpackhotspot.exe unpackhotspot.exe PID 1768 wrote to memory of 600 1768 unpackhotspot.exe unpackhotspot.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe"C:\Users\Admin\AppData\Local\Temp\ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\ea65aabffb33b122be980c2ea7a66f9ce8b3f81c83a94fff962bbc7725d8e7b7.exe--42502a942⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1744
-
C:\Windows\SysWOW64\unpackhotspot.exe"C:\Windows\SysWOW64\unpackhotspot.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\unpackhotspot.exe--d62ad2f32⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/600-66-0x0000000000000000-mapping.dmp
-
memory/1084-59-0x0000000000220000-0x0000000000231000-memory.dmpFilesize
68KB
-
memory/1084-61-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1744-60-0x0000000000000000-mapping.dmp
-
memory/1744-64-0x00000000752F1000-0x00000000752F3000-memory.dmpFilesize
8KB
-
memory/1768-67-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB