Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
17-05-2021 04:58
Static task
static1
Behavioral task
behavioral1
Sample
5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe
-
Size
372KB
-
MD5
ae7d41c270b9a835e387d6b3794d8db5
-
SHA1
afc7b1e9e5ab0c88038b0f6a021282b9eec549de
-
SHA256
5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98
-
SHA512
c69fd3fb00270ea093f5fb7c28c841c8f31b0f6d930d0f42144e6c3bcee7040c80e6ba707eecf2f3a47b6262cc92114c387ae1f45bd4e1e7be7bf2d3ca820780
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
printsxcl.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat printsxcl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
printsxcl.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections printsxcl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 printsxcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings printsxcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" printsxcl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix printsxcl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" printsxcl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" printsxcl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 printsxcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad printsxcl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a07000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 printsxcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 printsxcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" printsxcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" printsxcl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = a055c7f3f04ad701 printsxcl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" printsxcl.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings printsxcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} printsxcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" printsxcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" printsxcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 printsxcl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = a055c7f3f04ad701 printsxcl.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
printsxcl.exepid process 364 printsxcl.exe 364 printsxcl.exe 364 printsxcl.exe 364 printsxcl.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exepid process 1992 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exeprintsxcl.exedescription pid process target process PID 1756 wrote to memory of 1992 1756 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe PID 1756 wrote to memory of 1992 1756 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe PID 1756 wrote to memory of 1992 1756 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe PID 1756 wrote to memory of 1992 1756 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe 5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe PID 1652 wrote to memory of 364 1652 printsxcl.exe printsxcl.exe PID 1652 wrote to memory of 364 1652 printsxcl.exe printsxcl.exe PID 1652 wrote to memory of 364 1652 printsxcl.exe printsxcl.exe PID 1652 wrote to memory of 364 1652 printsxcl.exe printsxcl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe"C:\Users\Admin\AppData\Local\Temp\5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\5d5ef6429494a7789f3a086c5aeafd825cb033e74507c1c03495ceb37c81bf98.exe--744c99d72⤵
- Suspicious behavior: RenamesItself
PID:1992
-
-
C:\Windows\SysWOW64\printsxcl.exe"C:\Windows\SysWOW64\printsxcl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\printsxcl.exe--cd81ddb12⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:364
-