Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
18-05-2021 06:11
Static task
static1
Behavioral task
behavioral1
Sample
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe
-
Size
212KB
-
MD5
eef5dcc876300b282f79ec8e34e4abc0
-
SHA1
26997fec602370385eb1fd810984a516d2262176
-
SHA256
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2
-
SHA512
5c3d52741b1c979c5a3eb8f1cb54b515cd9a3d88d334e50fa75593fe5a0e4aab344d2fea5738551baa2d28c317b1c24b839fdccda63151f686b50432c575a455
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
specialmonthly.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat specialmonthly.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
specialmonthly.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" specialmonthly.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 specialmonthly.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix specialmonthly.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" specialmonthly.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad specialmonthly.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} specialmonthly.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" specialmonthly.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" specialmonthly.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings specialmonthly.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" specialmonthly.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070019000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 specialmonthly.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" specialmonthly.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 80cb7e51ac4bd701 specialmonthly.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 specialmonthly.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 80cb7e51ac4bd701 specialmonthly.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings specialmonthly.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections specialmonthly.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" specialmonthly.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" specialmonthly.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 specialmonthly.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 specialmonthly.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
specialmonthly.exepid process 1488 specialmonthly.exe 1488 specialmonthly.exe 1488 specialmonthly.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exepid process 1636 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exec4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exespecialmonthly.exespecialmonthly.exepid process 1888 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe 1636 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe 1872 specialmonthly.exe 1488 specialmonthly.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exespecialmonthly.exedescription pid process target process PID 1888 wrote to memory of 1636 1888 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 1888 wrote to memory of 1636 1888 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 1888 wrote to memory of 1636 1888 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 1888 wrote to memory of 1636 1888 c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe PID 1872 wrote to memory of 1488 1872 specialmonthly.exe specialmonthly.exe PID 1872 wrote to memory of 1488 1872 specialmonthly.exe specialmonthly.exe PID 1872 wrote to memory of 1488 1872 specialmonthly.exe specialmonthly.exe PID 1872 wrote to memory of 1488 1872 specialmonthly.exe specialmonthly.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe"C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\c4ee59399cd3b4b7b480cc473587002ae58267cf9d49fc95c3796fc779bb0ac2.exe--c9b0ba0b2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1660
-
C:\Windows\SysWOW64\specialmonthly.exe"C:\Windows\SysWOW64\specialmonthly.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\specialmonthly.exe--1c8b2b862⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1488
-