Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-05-2021 03:31
Static task
static1
Behavioral task
behavioral1
Sample
a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe
-
Size
143KB
-
MD5
4944078f11a3afdc7947a6cc5ce481cd
-
SHA1
2bba78c92d5424a8cd1cdcd0360d690be66e3b38
-
SHA256
a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c
-
SHA512
32e3d4db615d59295f57bcdce053e857fc371329125d63fbff717c47e43e6e7362296808bc0c628c187cbb7751d93078522c62bec164556f028732f9044f7759
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
unpackhotspot.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat unpackhotspot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
unpackhotspot.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 80c5a83e794ad701 unpackhotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} unpackhotspot.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 80c5a83e794ad701 unpackhotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix unpackhotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" unpackhotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 unpackhotspot.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" unpackhotspot.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" unpackhotspot.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
unpackhotspot.exepid process 1608 unpackhotspot.exe 1608 unpackhotspot.exe 1608 unpackhotspot.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exepid process 1812 a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exea195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exeunpackhotspot.exeunpackhotspot.exepid process 1084 a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe 1812 a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe 1576 unpackhotspot.exe 1608 unpackhotspot.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exeunpackhotspot.exedescription pid process target process PID 1084 wrote to memory of 1812 1084 a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe PID 1084 wrote to memory of 1812 1084 a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe PID 1084 wrote to memory of 1812 1084 a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe PID 1084 wrote to memory of 1812 1084 a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe PID 1576 wrote to memory of 1608 1576 unpackhotspot.exe unpackhotspot.exe PID 1576 wrote to memory of 1608 1576 unpackhotspot.exe unpackhotspot.exe PID 1576 wrote to memory of 1608 1576 unpackhotspot.exe unpackhotspot.exe PID 1576 wrote to memory of 1608 1576 unpackhotspot.exe unpackhotspot.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe"C:\Users\Admin\AppData\Local\Temp\a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\a195d31134fbe0ce7f592dc7e5b6ab3d8c819ef2da4e8d0d1253dcf954881f7c.exe--2ba6dc132⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1812
-
-
C:\Windows\SysWOW64\unpackhotspot.exe"C:\Windows\SysWOW64\unpackhotspot.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\unpackhotspot.exe--d62ad2f32⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1608
-