Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
16-05-2021 04:46
Static task
static1
Behavioral task
behavioral1
Sample
d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe
-
Size
89KB
-
MD5
d39a5f8dfa267d2adea6072d3f62866e
-
SHA1
57be36026bff62b04c93acfe92f9b24544b37539
-
SHA256
d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0
-
SHA512
ec14657dc3dd9714b64e2cbf381e3b9eaec0f7649f6da0e8079d42dc9521dbb53ff75d66d8033f311ef18a8282f7b93ae8c32a0aaf77d90f3e675161ba3dc3dd
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
pnfrelated.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat pnfrelated.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pnfrelated.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pnfrelated.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pnfrelated.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 pnfrelated.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
pnfrelated.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix pnfrelated.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" pnfrelated.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" pnfrelated.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
pnfrelated.exepid process 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe 4080 pnfrelated.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exepid process 2172 d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exepnfrelated.exedescription pid process target process PID 2208 wrote to memory of 2172 2208 d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe PID 2208 wrote to memory of 2172 2208 d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe PID 2208 wrote to memory of 2172 2208 d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe PID 744 wrote to memory of 4080 744 pnfrelated.exe pnfrelated.exe PID 744 wrote to memory of 4080 744 pnfrelated.exe pnfrelated.exe PID 744 wrote to memory of 4080 744 pnfrelated.exe pnfrelated.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe"C:\Users\Admin\AppData\Local\Temp\d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\d80b4a5441fb29a2cb45d437423d84ded8b3d57dff7bb884ab501acf11fe71c0.exe--8152a55c2⤵
- Suspicious behavior: RenamesItself
PID:2172
-
-
C:\Windows\SysWOW64\pnfrelated.exe"C:\Windows\SysWOW64\pnfrelated.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\pnfrelated.exe--ca7649f52⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4080
-