Analysis
-
max time kernel
133s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
30-09-2021 12:28
Static task
static1
Behavioral task
behavioral1
Sample
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
Resource
win10-en-20210920
General
-
Target
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
-
Size
195KB
-
MD5
e54b3460e857f66a8b7524277c972f92
-
SHA1
f5a67a80581c6964099f9d05247b128ac842c7c2
-
SHA256
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d
-
SHA512
ca6515d532e676ee8c8ba2002bb31acabd43b4504c910a059dd83d104448d24083bf08280858047d55a59f6860c7eb9972093b9c19e9d12b4d22db002e1717db
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
guiddefglue.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat guiddefglue.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 guiddefglue.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE guiddefglue.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies guiddefglue.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 guiddefglue.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
guiddefglue.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" guiddefglue.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix guiddefglue.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" guiddefglue.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
guiddefglue.exepid process 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe 1824 guiddefglue.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exepid process 2504 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exeguiddefglue.exedescription pid process target process PID 2388 wrote to memory of 2504 2388 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 2388 wrote to memory of 2504 2388 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 2388 wrote to memory of 2504 2388 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 2692 wrote to memory of 1824 2692 guiddefglue.exe guiddefglue.exe PID 2692 wrote to memory of 1824 2692 guiddefglue.exe guiddefglue.exe PID 2692 wrote to memory of 1824 2692 guiddefglue.exe guiddefglue.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe--fbf87da82⤵
- Suspicious behavior: RenamesItself
PID:2504
-
C:\Windows\SysWOW64\guiddefglue.exe"C:\Windows\SysWOW64\guiddefglue.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\guiddefglue.exe--90ee65872⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1824