Analysis
-
max time kernel
144s -
max time network
158s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-02-2022 07:16
Behavioral task
behavioral1
Sample
2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe
-
Size
60KB
-
MD5
4f2b2f25dfdf2822a3d891a276069ff1
-
SHA1
411de06d6253b75c17a9c47b9c44650f5187d6a3
-
SHA256
2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac
-
SHA512
68e29d6e080b3c5e241deb4023da3268073f1183c75edd954966227bff0d282a700553abac27e4109c62157e36b7d60520d67268d80ecea71854848f8228abc1
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
driversymbol.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat driversymbol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
driversymbol.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E7FF2A58-236C-4CF9-B9AC-A01D26ADE321}\6e-b3-27-43-75-e5 driversymbol.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-b3-27-43-75-e5\WpadDecisionTime = 702e1962bc27d801 driversymbol.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings driversymbol.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings driversymbol.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-b3-27-43-75-e5 driversymbol.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 driversymbol.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E7FF2A58-236C-4CF9-B9AC-A01D26ADE321}\WpadDecisionTime = 702e1962bc27d801 driversymbol.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-b3-27-43-75-e5\WpadDecision = "0" driversymbol.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections driversymbol.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix driversymbol.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" driversymbol.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0163000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 driversymbol.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E7FF2A58-236C-4CF9-B9AC-A01D26ADE321}\WpadNetworkName = "Network 3" driversymbol.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6e-b3-27-43-75-e5\WpadDecisionReason = "1" driversymbol.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 driversymbol.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" driversymbol.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad driversymbol.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E7FF2A58-236C-4CF9-B9AC-A01D26ADE321}\WpadDecision = "0" driversymbol.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" driversymbol.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E7FF2A58-236C-4CF9-B9AC-A01D26ADE321} driversymbol.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E7FF2A58-236C-4CF9-B9AC-A01D26ADE321}\WpadDecisionReason = "1" driversymbol.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
driversymbol.exepid process 624 driversymbol.exe 624 driversymbol.exe 624 driversymbol.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exepid process 848 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exedriversymbol.exedescription pid process target process PID 1452 wrote to memory of 848 1452 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe PID 1452 wrote to memory of 848 1452 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe PID 1452 wrote to memory of 848 1452 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe PID 1452 wrote to memory of 848 1452 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe 2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe PID 776 wrote to memory of 624 776 driversymbol.exe driversymbol.exe PID 776 wrote to memory of 624 776 driversymbol.exe driversymbol.exe PID 776 wrote to memory of 624 776 driversymbol.exe driversymbol.exe PID 776 wrote to memory of 624 776 driversymbol.exe driversymbol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe"C:\Users\Admin\AppData\Local\Temp\2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\2eef2f88dc510ccfb6b90011eb308b90819efffc3bfa0c91a06d77d22d5386ac.exe--ee5b15152⤵
- Suspicious behavior: RenamesItself
PID:848
-
-
C:\Windows\SysWOW64\driversymbol.exe"C:\Windows\SysWOW64\driversymbol.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\driversymbol.exe--f932b3722⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:624
-