Analysis
-
max time kernel
149s -
max time network
186s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-05-2021 01:06
Static task
static1
Behavioral task
behavioral1
Sample
2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe
-
Size
135KB
-
MD5
6e561be14e05c25a7f317172f73f2117
-
SHA1
063dc4313363b3eb96f1f0fecfa7709aa288f37c
-
SHA256
2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf
-
SHA512
ae6d76057abe06e0f1058304270d1311b8c58f96c14cbfcb22efe175d16add88311a912bb4e63f780c8d7481ae82dc9eb4e16c4b9fc09e7bdea4a97a1e8e7aae
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
randomsel.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat randomsel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
randomsel.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings randomsel.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad randomsel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 randomsel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionReason = "1" randomsel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecision = "0" randomsel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadNetworkName = "Network" randomsel.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\92-fb-4e-a0-c8-83 randomsel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\92-fb-4e-a0-c8-83\WpadDecisionReason = "1" randomsel.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings randomsel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" randomsel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\92-fb-4e-a0-c8-83\WpadDecisionTime = 907dcc20604ad701 randomsel.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections randomsel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix randomsel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" randomsel.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" randomsel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 randomsel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = 907dcc20604ad701 randomsel.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\92-fb-4e-a0-c8-83 randomsel.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 randomsel.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7} randomsel.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\92-fb-4e-a0-c8-83\WpadDecision = "0" randomsel.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
randomsel.exepid process 752 randomsel.exe 752 randomsel.exe 752 randomsel.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exepid process 1572 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exerandomsel.exerandomsel.exepid process 1472 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe 1572 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe 1800 randomsel.exe 752 randomsel.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exerandomsel.exedescription pid process target process PID 1472 wrote to memory of 1572 1472 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe PID 1472 wrote to memory of 1572 1472 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe PID 1472 wrote to memory of 1572 1472 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe PID 1472 wrote to memory of 1572 1472 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe 2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe PID 1800 wrote to memory of 752 1800 randomsel.exe randomsel.exe PID 1800 wrote to memory of 752 1800 randomsel.exe randomsel.exe PID 1800 wrote to memory of 752 1800 randomsel.exe randomsel.exe PID 1800 wrote to memory of 752 1800 randomsel.exe randomsel.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe"C:\Users\Admin\AppData\Local\Temp\2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\2a66d935b5f241a7592063bdb3293a9614abc5dac09f2668839bda53198defdf.exe--46a47f692⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1572
-
-
C:\Windows\SysWOW64\randomsel.exe"C:\Windows\SysWOW64\randomsel.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\randomsel.exe--a6ecff8d2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:752
-