Analysis
-
max time kernel
130s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-05-2021 01:30
Static task
static1
Behavioral task
behavioral1
Sample
cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe
Resource
win10v20210408
General
-
Target
cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe
-
Size
148KB
-
MD5
59eed63f3d5a1f50016c55ebc9936fbf
-
SHA1
92c3c32a397c39b5e2ef0b6489ec8cd750065620
-
SHA256
cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa
-
SHA512
cdb6d47d0c0aaf66a69f7e17f9edde052b7080b9e94bfe388821d7fa19547cb85955dba2ab322c4c65d55ddf5118308d44f72b6320b6d0cec8e2c303fcfb7423
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
allowmig.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat allowmig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
Processes:
allowmig.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad allowmig.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" allowmig.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings allowmig.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections allowmig.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} allowmig.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 0086965b564ad701 allowmig.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 allowmig.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings allowmig.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 allowmig.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 allowmig.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" allowmig.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 allowmig.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 allowmig.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" allowmig.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" allowmig.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" allowmig.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" allowmig.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 0086965b564ad701 allowmig.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.execf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exeallowmig.exeallowmig.exepid process 1084 cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe 1992 cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe 288 allowmig.exe 396 allowmig.exe 396 allowmig.exe 396 allowmig.exe 396 allowmig.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exepid process 1992 cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exeallowmig.exedescription pid process target process PID 1084 wrote to memory of 1992 1084 cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe PID 1084 wrote to memory of 1992 1084 cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe PID 1084 wrote to memory of 1992 1084 cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe PID 1084 wrote to memory of 1992 1084 cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe PID 288 wrote to memory of 396 288 allowmig.exe allowmig.exe PID 288 wrote to memory of 396 288 allowmig.exe allowmig.exe PID 288 wrote to memory of 396 288 allowmig.exe allowmig.exe PID 288 wrote to memory of 396 288 allowmig.exe allowmig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe"C:\Users\Admin\AppData\Local\Temp\cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe"C:\Users\Admin\AppData\Local\Temp\cf677969114fa5594fcdbf3de9d41776037d7396c99bd704b7d50a00dbfa65fa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1992
-
-
C:\Windows\SysWOW64\allowmig.exe"C:\Windows\SysWOW64\allowmig.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\allowmig.exe"C:\Windows\SysWOW64\allowmig.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:396
-