Analysis
-
max time kernel
148s -
max time network
203s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-05-2021 06:07
Static task
static1
Behavioral task
behavioral1
Sample
bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe
-
Size
136KB
-
MD5
e9d2d3e643fe767bce1cfeada14b0fd4
-
SHA1
f1a1048ba8b93de2f5c9c91801fa9003a896c20e
-
SHA256
bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636
-
SHA512
b1296468dcbc6fcd95b647eaa3a98dab3b244027b1769be7cba6931dba2c8b5fa8abee68ef21ef6bd16d5d49a0e90aea89ab744bdb69220789f12c9d0615c745
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
hotspottargets.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat hotspottargets.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
hotspottargets.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad hotspottargets.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = 10ee2b67b54ad701 hotspottargets.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-de-16-a5-5e-94 hotspottargets.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-de-16-a5-5e-94\WpadDecisionReason = "1" hotspottargets.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hotspottargets.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix hotspottargets.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" hotspottargets.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hotspottargets.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections hotspottargets.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" hotspottargets.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecision = "0" hotspottargets.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadNetworkName = "Network" hotspottargets.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-de-16-a5-5e-94\WpadDecisionTime = 10ee2b67b54ad701 hotspottargets.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings hotspottargets.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" hotspottargets.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a07000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 hotspottargets.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7} hotspottargets.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionReason = "1" hotspottargets.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\ae-de-16-a5-5e-94 hotspottargets.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ae-de-16-a5-5e-94\WpadDecision = "0" hotspottargets.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings hotspottargets.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
hotspottargets.exepid process 912 hotspottargets.exe 912 hotspottargets.exe 912 hotspottargets.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exepid process 1764 bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exebf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exehotspottargets.exehotspottargets.exepid process 332 bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe 1764 bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe 1528 hotspottargets.exe 912 hotspottargets.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exehotspottargets.exedescription pid process target process PID 332 wrote to memory of 1764 332 bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe PID 332 wrote to memory of 1764 332 bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe PID 332 wrote to memory of 1764 332 bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe PID 332 wrote to memory of 1764 332 bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe PID 1528 wrote to memory of 912 1528 hotspottargets.exe hotspottargets.exe PID 1528 wrote to memory of 912 1528 hotspottargets.exe hotspottargets.exe PID 1528 wrote to memory of 912 1528 hotspottargets.exe hotspottargets.exe PID 1528 wrote to memory of 912 1528 hotspottargets.exe hotspottargets.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe"C:\Users\Admin\AppData\Local\Temp\bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\bf6f9f8f38399302917fd8d4b2db61ac34fc61bb72c049506c602ac3542db636.exe--3b78a4df2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1764
-
-
C:\Windows\SysWOW64\hotspottargets.exe"C:\Windows\SysWOW64\hotspottargets.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\hotspottargets.exe--d24aa8a52⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:912
-