Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-02-2022 15:56
Behavioral task
behavioral1
Sample
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe
-
Size
65KB
-
MD5
f32f76d54ea70f75302793d7e0f61762
-
SHA1
8c350b7e986a7b312ac42acaff91316f196ce06c
-
SHA256
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709
-
SHA512
3dd0b97da2768fddda53ca1343b62527194f2f505c1a2fd80c406ae581a7fc718c939c4c1905fa1aaeaf8cd3dfeaff02823449a0506cc29598165602a61c62f9
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
clientpoller.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat clientpoller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 25 IoCs
Processes:
clientpoller.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings clientpoller.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix clientpoller.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" clientpoller.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8DF16E8D-AD68-472B-B283-0FBAC9B565F7}\WpadDecisionReason = "1" clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8DF16E8D-AD68-472B-B283-0FBAC9B565F7}\WpadDecisionTime = b067d3730d28d801 clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-36-91-03-22-57\WpadDecisionTime = b067d3730d28d801 clientpoller.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0085000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8DF16E8D-AD68-472B-B283-0FBAC9B565F7}\WpadDecisionTime = f0b554370d28d801 clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-36-91-03-22-57\WpadDecisionTime = f0b554370d28d801 clientpoller.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0085000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 clientpoller.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings clientpoller.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8DF16E8D-AD68-472B-B283-0FBAC9B565F7}\WpadDecision = "0" clientpoller.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-36-91-03-22-57\WpadDetectedUrl clientpoller.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-36-91-03-22-57\WpadDecisionReason = "1" clientpoller.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" clientpoller.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" clientpoller.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad clientpoller.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8DF16E8D-AD68-472B-B283-0FBAC9B565F7} clientpoller.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8DF16E8D-AD68-472B-B283-0FBAC9B565F7}\WpadNetworkName = "Network 3" clientpoller.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-36-91-03-22-57 clientpoller.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8DF16E8D-AD68-472B-B283-0FBAC9B565F7}\32-36-91-03-22-57 clientpoller.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-36-91-03-22-57\WpadDecision = "0" clientpoller.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
clientpoller.exepid process 872 clientpoller.exe 872 clientpoller.exe 872 clientpoller.exe 872 clientpoller.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exepid process 2032 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.execlientpoller.exedescription pid process target process PID 1540 wrote to memory of 2032 1540 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe PID 1540 wrote to memory of 2032 1540 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe PID 1540 wrote to memory of 2032 1540 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe PID 1540 wrote to memory of 2032 1540 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe PID 428 wrote to memory of 872 428 clientpoller.exe clientpoller.exe PID 428 wrote to memory of 872 428 clientpoller.exe clientpoller.exe PID 428 wrote to memory of 872 428 clientpoller.exe clientpoller.exe PID 428 wrote to memory of 872 428 clientpoller.exe clientpoller.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe"C:\Users\Admin\AppData\Local\Temp\16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe--54c49f182⤵
- Suspicious behavior: RenamesItself
PID:2032
-
-
C:\Windows\SysWOW64\clientpoller.exe"C:\Windows\SysWOW64\clientpoller.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\clientpoller.exe--566465692⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:872
-