Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
30-09-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe
-
Size
195KB
-
MD5
e54b3460e857f66a8b7524277c972f92
-
SHA1
f5a67a80581c6964099f9d05247b128ac842c7c2
-
SHA256
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d
-
SHA512
ca6515d532e676ee8c8ba2002bb31acabd43b4504c910a059dd83d104448d24083bf08280858047d55a59f6860c7eb9972093b9c19e9d12b4d22db002e1717db
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
dumplics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 dumplics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat dumplics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 dumplics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE dumplics.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies dumplics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
dumplics.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix dumplics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" dumplics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" dumplics.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
dumplics.exepid process 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe 3920 dumplics.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exepid process 2500 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exedumplics.exedescription pid process target process PID 2164 wrote to memory of 2500 2164 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 2164 wrote to memory of 2500 2164 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 2164 wrote to memory of 2500 2164 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe 46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe PID 2820 wrote to memory of 3920 2820 dumplics.exe dumplics.exe PID 2820 wrote to memory of 3920 2820 dumplics.exe dumplics.exe PID 2820 wrote to memory of 3920 2820 dumplics.exe dumplics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\46035a00cc4cedf123ce453933c41f5a957b8e10671fd331dc14bf34df338c0d.exe--fbf87da82⤵
- Suspicious behavior: RenamesItself
PID:2500
-
C:\Windows\SysWOW64\dumplics.exe"C:\Windows\SysWOW64\dumplics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\dumplics.exe--ff2cfe332⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3920