Analysis
-
max time kernel
136s -
max time network
161s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
17-05-2021 23:59
Static task
static1
Behavioral task
behavioral1
Sample
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe
Resource
win7v20210408
General
-
Target
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe
-
Size
212KB
-
MD5
eef5dcc876300b282f79ec8e34e4abc0
-
SHA1
26997fec602370385eb1fd810984a516d2262176
-
SHA256
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2
-
SHA512
5c3d52741b1c979c5a3eb8f1cb54b515cd9a3d88d334e50fa75593fe5a0e4aab344d2fea5738551baa2d28c317b1c24b839fdccda63151f686b50432c575a455
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
sensormsp.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat sensormsp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 sensormsp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE sensormsp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies sensormsp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 sensormsp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
sensormsp.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix sensormsp.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" sensormsp.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" sensormsp.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
sensormsp.exepid process 2580 sensormsp.exe 2580 sensormsp.exe 2580 sensormsp.exe 2580 sensormsp.exe 2580 sensormsp.exe 2580 sensormsp.exe 2580 sensormsp.exe 2580 sensormsp.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exepid process 976 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exec4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exesensormsp.exesensormsp.exepid process 644 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe 976 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe 2288 sensormsp.exe 2580 sensormsp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exesensormsp.exedescription pid process target process PID 644 wrote to memory of 976 644 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 644 wrote to memory of 976 644 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 644 wrote to memory of 976 644 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 2288 wrote to memory of 2580 2288 sensormsp.exe sensormsp.exe PID 2288 wrote to memory of 2580 2288 sensormsp.exe sensormsp.exe PID 2288 wrote to memory of 2580 2288 sensormsp.exe sensormsp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe"C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe--c9b0ba0b2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Windows\SysWOW64\sensormsp.exe"C:\Windows\SysWOW64\sensormsp.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\sensormsp.exe--7c6e78662⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\eb905dde0dd4c3828a1a052bdd33cc25_cc51e87d-bda7-4ef7-80cf-c431fec6b805
MD55c6bc175263daa8442afc83feafc24da
SHA139eea46babd4e1d8ef3ade65c2ee964a893c4f55
SHA256d75ab3c82485188a40e0316468b20c6c997adc98f855474e08c1af1582bfbc09
SHA51283fe778c30a452c1e229a5eb6367287b4f2c947621f1024ed038fe43a7216e3e047573e9fe5d97d24c851397372fb7e25692b4068bead2090d946665792b7255