Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
17-05-2021 23:59
Static task
static1
Behavioral task
behavioral1
Sample
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe
-
Size
212KB
-
MD5
eef5dcc876300b282f79ec8e34e4abc0
-
SHA1
26997fec602370385eb1fd810984a516d2262176
-
SHA256
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2
-
SHA512
5c3d52741b1c979c5a3eb8f1cb54b515cd9a3d88d334e50fa75593fe5a0e4aab344d2fea5738551baa2d28c317b1c24b839fdccda63151f686b50432c575a455
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
nicwiz.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat nicwiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
nicwiz.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings nicwiz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad nicwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070025000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nicwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = 303af931b04bd701 nicwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadNetworkName = "Network" nicwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nicwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionReason = "1" nicwiz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nicwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix nicwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" nicwiz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\fe-bd-9c-c7-67-42 nicwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bd-9c-c7-67-42\WpadDecisionReason = "1" nicwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecision = "0" nicwiz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bd-9c-c7-67-42 nicwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bd-9c-c7-67-42\WpadDecisionTime = 303af931b04bd701 nicwiz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 nicwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" nicwiz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" nicwiz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings nicwiz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7} nicwiz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bd-9c-c7-67-42\WpadDecision = "0" nicwiz.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
nicwiz.exepid process 800 nicwiz.exe 800 nicwiz.exe 800 nicwiz.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exepid process 1692 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exec4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exenicwiz.exenicwiz.exepid process 1920 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe 1692 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe 752 nicwiz.exe 800 nicwiz.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exenicwiz.exedescription pid process target process PID 1920 wrote to memory of 1692 1920 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 1920 wrote to memory of 1692 1920 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 1920 wrote to memory of 1692 1920 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 1920 wrote to memory of 1692 1920 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 752 wrote to memory of 800 752 nicwiz.exe nicwiz.exe PID 752 wrote to memory of 800 752 nicwiz.exe nicwiz.exe PID 752 wrote to memory of 800 752 nicwiz.exe nicwiz.exe PID 752 wrote to memory of 800 752 nicwiz.exe nicwiz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe"C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe--c9b0ba0b2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
C:\Windows\SysWOW64\nicwiz.exe"C:\Windows\SysWOW64\nicwiz.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\nicwiz.exe--6b7192b22⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:800
-