Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-05-2021 01:35
Static task
static1
Behavioral task
behavioral1
Sample
af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe
-
Size
142KB
-
MD5
4128d41ae486b1f912d4697cad6d3672
-
SHA1
5515cc53e255e89fead948fad2af1bac2d445f57
-
SHA256
af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7
-
SHA512
7327fe21f3d9c955e0df211248ecaba885f1071bd8500c87041e756204d7bc1ca2ac53e4c6830412ca5e14be1db70b8ffad22ca59de1857507d7fa96b51b6052
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
linescomment.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat linescomment.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 25 IoCs
Processes:
linescomment.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 linescomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" linescomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad linescomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" linescomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" linescomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 2075521b594ad701 linescomment.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings linescomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings linescomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" linescomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} linescomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" linescomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070018000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070018000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = c00c7bd9584ad701 linescomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDetectedUrl linescomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix linescomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" linescomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = c00c7bd9584ad701 linescomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 linescomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 2075521b594ad701 linescomment.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
linescomment.exepid process 1288 linescomment.exe 1288 linescomment.exe 1288 linescomment.exe 1288 linescomment.exe 1288 linescomment.exe 1288 linescomment.exe 1288 linescomment.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exepid process 1416 af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exeaf58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exelinescomment.exelinescomment.exepid process 1688 af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe 1416 af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe 1320 linescomment.exe 1288 linescomment.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exelinescomment.exedescription pid process target process PID 1688 wrote to memory of 1416 1688 af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe PID 1688 wrote to memory of 1416 1688 af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe PID 1688 wrote to memory of 1416 1688 af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe PID 1688 wrote to memory of 1416 1688 af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe PID 1320 wrote to memory of 1288 1320 linescomment.exe linescomment.exe PID 1320 wrote to memory of 1288 1320 linescomment.exe linescomment.exe PID 1320 wrote to memory of 1288 1320 linescomment.exe linescomment.exe PID 1320 wrote to memory of 1288 1320 linescomment.exe linescomment.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe"C:\Users\Admin\AppData\Local\Temp\af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\af58798ff787aa99c08d586ab9bcc267cffa32a86c3e62061e9996f684f5fef7.exe--ada2dd2c2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1416
-
-
C:\Windows\SysWOW64\linescomment.exe"C:\Windows\SysWOW64\linescomment.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\linescomment.exe--cc7d71322⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1288
-