Analysis
-
max time kernel
136s -
max time network
180s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-05-2021 00:24
Static task
static1
Behavioral task
behavioral1
Sample
998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe
-
Size
162KB
-
MD5
08d1c814ee058a0f6885a0f06803f801
-
SHA1
55050c5562087a4cca3421df340439a0030077bc
-
SHA256
998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e
-
SHA512
6d91f1bdd7d73a256384677c265c7f25c62ac3fe5ed836158dcdb0670ff54a779c7d55bc913555d4dfebd0db9e489b91fc009612448d615aadafaa3154c74b64
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
execboxes.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat execboxes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
execboxes.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 execboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" execboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070029000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 execboxes.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad execboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7} execboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-43-cb-33-5e-23\WpadDecisionReason = "1" execboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-43-cb-33-5e-23\WpadDecisionTime = e0b8cb0afc49d701 execboxes.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections execboxes.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" execboxes.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings execboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 execboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\fa-43-cb-33-5e-23 execboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings execboxes.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" execboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = e0b8cb0afc49d701 execboxes.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadNetworkName = "Network" execboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-43-cb-33-5e-23\WpadDecision = "0" execboxes.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix execboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionReason = "1" execboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecision = "0" execboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-43-cb-33-5e-23 execboxes.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
execboxes.exepid process 1732 execboxes.exe 1732 execboxes.exe 1732 execboxes.exe 1732 execboxes.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exepid process 1372 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exeexecboxes.exeexecboxes.exepid process 1104 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe 1372 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe 752 execboxes.exe 1732 execboxes.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exeexecboxes.exedescription pid process target process PID 1104 wrote to memory of 1372 1104 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe PID 1104 wrote to memory of 1372 1104 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe PID 1104 wrote to memory of 1372 1104 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe PID 1104 wrote to memory of 1372 1104 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe 998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe PID 752 wrote to memory of 1732 752 execboxes.exe execboxes.exe PID 752 wrote to memory of 1732 752 execboxes.exe execboxes.exe PID 752 wrote to memory of 1732 752 execboxes.exe execboxes.exe PID 752 wrote to memory of 1732 752 execboxes.exe execboxes.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe"C:\Users\Admin\AppData\Local\Temp\998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\998cd14f971b790ec6df859425779dd376d5499440f21ca476434c2041fb0b1e.exe--cb20c0c52⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1372
-
-
C:\Windows\SysWOW64\execboxes.exe"C:\Windows\SysWOW64\execboxes.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\execboxes.exe--bce9b8de2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1732
-