Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
30-09-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
-
Size
195KB
-
MD5
e54b3460e857f66a8b7524277c972f92
-
SHA1
f5a67a80581c6964099f9d05247b128ac842c7c2
-
SHA256
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d
-
SHA512
ca6515d532e676ee8c8ba2002bb31acabd43b4504c910a059dd83d104448d24083bf08280858047d55a59f6860c7eb9972093b9c19e9d12b4d22db002e1717db
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
linessorting.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat linessorting.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
linessorting.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix linessorting.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings linessorting.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings linessorting.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" linessorting.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 linessorting.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2F9E391C-5D98-464D-97C9-DBCCD1C0F545} linessorting.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2F9E391C-5D98-464D-97C9-DBCCD1C0F545}\WpadDecisionTime = 00c5cf89fcb5d701 linessorting.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-fa-f9-1e-84\WpadDecisionTime = 00c5cf89fcb5d701 linessorting.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 linessorting.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 linessorting.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad linessorting.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2F9E391C-5D98-464D-97C9-DBCCD1C0F545}\WpadDecisionReason = "1" linessorting.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2F9E391C-5D98-464D-97C9-DBCCD1C0F545}\WpadDecision = "0" linessorting.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-fa-f9-1e-84 linessorting.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2F9E391C-5D98-464D-97C9-DBCCD1C0F545}\02-2d-fa-f9-1e-84 linessorting.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections linessorting.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" linessorting.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2F9E391C-5D98-464D-97C9-DBCCD1C0F545}\WpadNetworkName = "Network 3" linessorting.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-fa-f9-1e-84\WpadDecisionReason = "1" linessorting.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-fa-f9-1e-84\WpadDecision = "0" linessorting.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" linessorting.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
linessorting.exepid process 1652 linessorting.exe 1652 linessorting.exe 1652 linessorting.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exepid process 1124 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exelinessorting.exelinessorting.exepid process 1116 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 1124 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 1648 linessorting.exe 1652 linessorting.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exelinessorting.exedescription pid process target process PID 1116 wrote to memory of 1124 1116 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 1116 wrote to memory of 1124 1116 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 1116 wrote to memory of 1124 1116 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 1116 wrote to memory of 1124 1116 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 1648 wrote to memory of 1652 1648 linessorting.exe linessorting.exe PID 1648 wrote to memory of 1652 1648 linessorting.exe linessorting.exe PID 1648 wrote to memory of 1652 1648 linessorting.exe linessorting.exe PID 1648 wrote to memory of 1652 1648 linessorting.exe linessorting.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe--fbf87da82⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1124
-
C:\Windows\SysWOW64\linessorting.exe"C:\Windows\SysWOW64\linessorting.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\linessorting.exe--b0b1c2772⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1652