Analysis
-
max time kernel
130s -
max time network
175s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-05-2021 01:04
Static task
static1
Behavioral task
behavioral1
Sample
5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe
-
Size
135KB
-
MD5
7978d0ffad1086c1b4d75eec333450d7
-
SHA1
19b3bab88d955bf2f5ab1444539d80bd21d300b6
-
SHA256
5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44
-
SHA512
bba475b2bb158fa440f9eb2103a597ddc3de2611fd66a6e50378e8c58b0d2a6ed1cc87f138525f5e31f73ca71e20136e4b04f5e840b6aa8a4eeb459a4543547b
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
typrelated.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat typrelated.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
typrelated.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-9e-1c-4b-ba-31\WpadDecisionReason = "1" typrelated.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections typrelated.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 typrelated.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings typrelated.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7} typrelated.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadNetworkName = "Network" typrelated.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix typrelated.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad typrelated.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-9e-1c-4b-ba-31\WpadDecision = "0" typrelated.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecision = "0" typrelated.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-9e-1c-4b-ba-31 typrelated.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\16-9e-1c-4b-ba-31 typrelated.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" typrelated.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 typrelated.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a07001b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 typrelated.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionReason = "1" typrelated.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = 709572475f4ad701 typrelated.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings typrelated.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" typrelated.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" typrelated.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-9e-1c-4b-ba-31\WpadDecisionTime = 709572475f4ad701 typrelated.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
typrelated.exepid process 1132 typrelated.exe 1132 typrelated.exe 1132 typrelated.exe 1132 typrelated.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exepid process 1300 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exetyprelated.exetyprelated.exepid process 1708 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe 1300 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe 500 typrelated.exe 1132 typrelated.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exetyprelated.exedescription pid process target process PID 1708 wrote to memory of 1300 1708 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe PID 1708 wrote to memory of 1300 1708 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe PID 1708 wrote to memory of 1300 1708 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe PID 1708 wrote to memory of 1300 1708 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe 5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe PID 500 wrote to memory of 1132 500 typrelated.exe typrelated.exe PID 500 wrote to memory of 1132 500 typrelated.exe typrelated.exe PID 500 wrote to memory of 1132 500 typrelated.exe typrelated.exe PID 500 wrote to memory of 1132 500 typrelated.exe typrelated.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe"C:\Users\Admin\AppData\Local\Temp\5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\5758f0bef3b99e0d6037f43300e5c38e769d3f722769854dd8757002ff6e8b44.exe--614caaa62⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1300
-
-
C:\Windows\SysWOW64\typrelated.exe"C:\Windows\SysWOW64\typrelated.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\typrelated.exe--e163d1722⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1132
-