Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-07-2021 12:39
Static task
static1
Behavioral task
behavioral1
Sample
6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe
-
Size
360KB
-
MD5
354f7ec15741db7fcdfe7b158c14dfaa
-
SHA1
1265f62cb1bf781baaf5161e8b2fcd40a4026747
-
SHA256
6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c
-
SHA512
c8425a333a0aa7cb916406b825baaba2e462a81dcfc64b725dceadd81163f8928463603f70e6d5c354dd0ad59e4ed74572bcd780957d947bfa9d97ae89477227
Score
10/10
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
suricata: ET MALWARE Zeus GameOver Possible DGA NXDOMAIN Responses
-
Executes dropped EXE 2 IoCs
pid Process 4008 Wawbmdknpbal.exe 3972 Wawbmdknpbal.exe -
Deletes itself 1 IoCs
pid Process 4008 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 516 wrote to memory of 4008 516 6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe 74 PID 516 wrote to memory of 4008 516 6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe 74 PID 516 wrote to memory of 4008 516 6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe 74 PID 4008 wrote to memory of 3972 4008 Wawbmdknpbal.exe 75 PID 4008 wrote to memory of 3972 4008 Wawbmdknpbal.exe 75 PID 4008 wrote to memory of 3972 4008 Wawbmdknpbal.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe"C:\Users\Admin\AppData\Local\Temp\6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c.sample.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000002203⤵
- Executes dropped EXE
PID:3972
-
-