Analysis
-
max time kernel
1205s -
max time network
1218s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 15:46
Static task
static1
General
-
Target
DWS.exe
-
Size
129KB
-
MD5
d138cbdc2ae133c81752e4c1e4e8561e
-
SHA1
e8afba3556dc948b960622ff1054d5a809d43baf
-
SHA256
52025c86ec0b35f42f22742b92c4bbca97bef3f3f7593b488af738e16673048d
-
SHA512
774dc7ebd5c6d5df4e90767ab038e5b1f4ebd2e66fe0a0718126f0ee8613b230fca44dcc946ebf8ac9bd57f95642fb725cbbef795837b9f38fe051e59adf0fb5
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
LoopExtractor.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat LoopExtractor.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 LoopExtractor.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE LoopExtractor.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies LoopExtractor.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 LoopExtractor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
LoopExtractor.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix LoopExtractor.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" LoopExtractor.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" LoopExtractor.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
LoopExtractor.exepid process 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe 4084 LoopExtractor.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
DWS.exepid process 3972 DWS.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
DWS.exeLoopExtractor.exedescription pid process target process PID 3584 wrote to memory of 3972 3584 DWS.exe DWS.exe PID 3584 wrote to memory of 3972 3584 DWS.exe DWS.exe PID 3584 wrote to memory of 3972 3584 DWS.exe DWS.exe PID 3656 wrote to memory of 4084 3656 LoopExtractor.exe LoopExtractor.exe PID 3656 wrote to memory of 4084 3656 LoopExtractor.exe LoopExtractor.exe PID 3656 wrote to memory of 4084 3656 LoopExtractor.exe LoopExtractor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DWS.exe"C:\Users\Admin\AppData\Local\Temp\DWS.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\DWS.exe"C:\Users\Admin\AppData\Local\Temp\DWS.exe"2⤵
- Suspicious behavior: RenamesItself
PID:3972
-
C:\Windows\SysWOW64\LoopExtractor.exeC:\Windows\SysWOW64\LoopExtractor.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\LoopExtractor.exe"C:\Windows\SysWOW64\LoopExtractor.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4084