Analysis
-
max time kernel
130s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
16-05-2021 05:34
Static task
static1
Behavioral task
behavioral1
Sample
85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe
-
Size
162KB
-
MD5
d53c01297e52267714ebaf27cd3884e7
-
SHA1
96e1739d7b55d2f2640ddb9d9e3a869e4192a6b9
-
SHA256
85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3
-
SHA512
94a017d8d9cf7b6b889a2a28a4282e847c16a015e83024cfd812213035838f9e25ab0ae51b4f178d2c1ab79784a22d80712e117484aeb88736082297ef38069b
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
selparent.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies selparent.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 selparent.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat selparent.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 selparent.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE selparent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
selparent.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix selparent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" selparent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" selparent.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
selparent.exepid process 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe 2580 selparent.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exepid process 2456 85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exeselparent.exedescription pid process target process PID 3932 wrote to memory of 2456 3932 85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe 85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe PID 3932 wrote to memory of 2456 3932 85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe 85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe PID 3932 wrote to memory of 2456 3932 85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe 85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe PID 2804 wrote to memory of 2580 2804 selparent.exe selparent.exe PID 2804 wrote to memory of 2580 2804 selparent.exe selparent.exe PID 2804 wrote to memory of 2580 2804 selparent.exe selparent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe"C:\Users\Admin\AppData\Local\Temp\85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\85ea96b6ec918a3587c8c7a2d9dfe33e5c2de25e5a72dfded03d2bc2586d05e3.exe--70715e462⤵
- Suspicious behavior: RenamesItself
PID:2456
-
-
C:\Windows\SysWOW64\selparent.exe"C:\Windows\SysWOW64\selparent.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\selparent.exe--ff4c545a2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2580
-