Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
22-02-2022 15:56
Behavioral task
behavioral1
Sample
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe
-
Size
65KB
-
MD5
f32f76d54ea70f75302793d7e0f61762
-
SHA1
8c350b7e986a7b312ac42acaff91316f196ce06c
-
SHA256
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709
-
SHA512
3dd0b97da2768fddda53ca1343b62527194f2f505c1a2fd80c406ae581a7fc718c939c4c1905fa1aaeaf8cd3dfeaff02823449a0506cc29598165602a61c62f9
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
handcaching.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 handcaching.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 handcaching.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE handcaching.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies handcaching.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
handcaching.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix handcaching.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" handcaching.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" handcaching.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
handcaching.exepid process 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe 4824 handcaching.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exepid process 3308 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exehandcaching.exedescription pid process target process PID 2804 wrote to memory of 3308 2804 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe PID 2804 wrote to memory of 3308 2804 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe PID 2804 wrote to memory of 3308 2804 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe 16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe PID 3152 wrote to memory of 4824 3152 handcaching.exe handcaching.exe PID 3152 wrote to memory of 4824 3152 handcaching.exe handcaching.exe PID 3152 wrote to memory of 4824 3152 handcaching.exe handcaching.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe"C:\Users\Admin\AppData\Local\Temp\16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\16c1966aa46985b23969f4f226a3ae8cf5ec7d21c9998c9b89501bff460b6709.exe--54c49f182⤵
- Suspicious behavior: RenamesItself
PID:3308
-
-
C:\Windows\SysWOW64\handcaching.exe"C:\Windows\SysWOW64\handcaching.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\handcaching.exe--564dcd262⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4824
-