Analysis
-
max time kernel
159s -
max time network
154s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-09-2021 12:28
Static task
static1
Behavioral task
behavioral1
Sample
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
Resource
win10-en-20210920
General
-
Target
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
-
Size
195KB
-
MD5
e54b3460e857f66a8b7524277c972f92
-
SHA1
f5a67a80581c6964099f9d05247b128ac842c7c2
-
SHA256
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d
-
SHA512
ca6515d532e676ee8c8ba2002bb31acabd43b4504c910a059dd83d104448d24083bf08280858047d55a59f6860c7eb9972093b9c19e9d12b4d22db002e1717db
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
slideslide.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat slideslide.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
slideslide.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix slideslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" slideslide.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad slideslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-6a-95-23-1b-3d slideslide.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections slideslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionTime = 50cbc58207b6d701 slideslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-6a-95-23-1b-3d\WpadDecisionTime = 50cbc58207b6d701 slideslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-6a-95-23-1b-3d\WpadDecision = "0" slideslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\5a-6a-95-23-1b-3d slideslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5a-6a-95-23-1b-3d\WpadDecisionReason = "1" slideslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings slideslide.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings slideslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" slideslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecisionReason = "1" slideslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadNetworkName = "Network" slideslide.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" slideslide.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a07001c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideslide.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7} slideslide.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3A33DB50-CC69-497D-AB93-6EAB524EB9A7}\WpadDecision = "0" slideslide.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
slideslide.exepid process 2020 slideslide.exe 2020 slideslide.exe 2020 slideslide.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exepid process 1392 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exeslideslide.exeslideslide.exepid process 1836 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 1392 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 2000 slideslide.exe 2020 slideslide.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exeslideslide.exedescription pid process target process PID 1836 wrote to memory of 1392 1836 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 1836 wrote to memory of 1392 1836 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 1836 wrote to memory of 1392 1836 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 1836 wrote to memory of 1392 1836 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 2000 wrote to memory of 2020 2000 slideslide.exe slideslide.exe PID 2000 wrote to memory of 2020 2000 slideslide.exe slideslide.exe PID 2000 wrote to memory of 2020 2000 slideslide.exe slideslide.exe PID 2000 wrote to memory of 2020 2000 slideslide.exe slideslide.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe--fbf87da82⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1392
-
C:\Windows\SysWOW64\slideslide.exe"C:\Windows\SysWOW64\slideslide.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\slideslide.exe--d53c88522⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2020