Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
18-05-2021 05:56
Static task
static1
Behavioral task
behavioral1
Sample
88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe
Resource
win10v20210410
General
-
Target
88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe
-
Size
212KB
-
MD5
b32e26f8c8d982d8b1ad942b3e0d32cb
-
SHA1
bd0343fa996118f9f060908579299ebff7980700
-
SHA256
88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2
-
SHA512
58f09caabac2331f23d7fadfb15d85add2d52b4af5fb383888a444f19e3821fc45b00aa50aa130a7e2bcfef7d81e18694fd924d4fbb8dc532dba0715666bdeb2
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
wrapspeed.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wrapspeed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
wrapspeed.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wrapspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wrapspeed.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wrapspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" wrapspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 1017af640a4cd701 wrapspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" wrapspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} wrapspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" wrapspeed.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" wrapspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 wrapspeed.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wrapspeed.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wrapspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wrapspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wrapspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 wrapspeed.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" wrapspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 1017af640a4cd701 wrapspeed.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wrapspeed.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wrapspeed.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wrapspeed.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wrapspeed.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
wrapspeed.exepid process 1288 wrapspeed.exe 1288 wrapspeed.exe 1288 wrapspeed.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exepid process 1752 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exewrapspeed.exewrapspeed.exepid process 296 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe 1752 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe 1428 wrapspeed.exe 1288 wrapspeed.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exewrapspeed.exedescription pid process target process PID 296 wrote to memory of 1752 296 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe PID 296 wrote to memory of 1752 296 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe PID 296 wrote to memory of 1752 296 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe PID 296 wrote to memory of 1752 296 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe 88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe PID 1428 wrote to memory of 1288 1428 wrapspeed.exe wrapspeed.exe PID 1428 wrote to memory of 1288 1428 wrapspeed.exe wrapspeed.exe PID 1428 wrote to memory of 1288 1428 wrapspeed.exe wrapspeed.exe PID 1428 wrote to memory of 1288 1428 wrapspeed.exe wrapspeed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe"C:\Users\Admin\AppData\Local\Temp\88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\88b6e1df8dd5d0f3345948e81df1f70315927e949e875bdda440002b0c1d16b2.exe--379743e22⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wrapspeed.exe"C:\Windows\SysWOW64\wrapspeed.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wrapspeed.exe--fe9904d32⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx