Analysis
-
max time kernel
156s -
max time network
175s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-02-2022 19:18
Behavioral task
behavioral1
Sample
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe
-
Size
65KB
-
MD5
151b8048553fc049e478694822fe86af
-
SHA1
05c9624edbae54dbc770e5724be28ad137fe5a9a
-
SHA256
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32
-
SHA512
f503063747f0fcd9554416b2951db592c155306d24aadabaae7654b6c56522069687495775e4a51202c4a57175d0a0af5cbf517909dcaf45eec84d10de01bb1e
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
sndhero.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat sndhero.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 25 IoCs
Processes:
sndhero.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings sndhero.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" sndhero.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections sndhero.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{12EE5939-591A-4ABF-B82B-9C3B7553546C}\WpadDecisionReason = "1" sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{12EE5939-591A-4ABF-B82B-9C3B7553546C}\WpadDecisionTime = f0d7ee102c28d801 sndhero.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{12EE5939-591A-4ABF-B82B-9C3B7553546C}\WpadDecision = "0" sndhero.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-66-5a-3c-8b-9d sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-66-5a-3c-8b-9d\WpadDecisionTime = f0d7ee102c28d801 sndhero.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-66-5a-3c-8b-9d\WpadDecision = "0" sndhero.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-66-5a-3c-8b-9d\WpadDetectedUrl sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 sndhero.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{12EE5939-591A-4ABF-B82B-9C3B7553546C} sndhero.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{12EE5939-591A-4ABF-B82B-9C3B7553546C}\96-66-5a-3c-8b-9d sndhero.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-66-5a-3c-8b-9d\WpadDecisionReason = "1" sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{12EE5939-591A-4ABF-B82B-9C3B7553546C}\WpadDecisionTime = b0341f4b2c28d801 sndhero.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 sndhero.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix sndhero.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" sndhero.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" sndhero.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{12EE5939-591A-4ABF-B82B-9C3B7553546C}\WpadNetworkName = "Network 3" sndhero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-66-5a-3c-8b-9d\WpadDecisionTime = b0341f4b2c28d801 sndhero.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings sndhero.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
sndhero.exepid process 432 sndhero.exe 432 sndhero.exe 432 sndhero.exe 432 sndhero.exe 432 sndhero.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exepid process 1668 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exesndhero.exedescription pid process target process PID 1636 wrote to memory of 1668 1636 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe PID 1636 wrote to memory of 1668 1636 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe PID 1636 wrote to memory of 1668 1636 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe PID 1636 wrote to memory of 1668 1636 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe PID 268 wrote to memory of 432 268 sndhero.exe sndhero.exe PID 268 wrote to memory of 432 268 sndhero.exe sndhero.exe PID 268 wrote to memory of 432 268 sndhero.exe sndhero.exe PID 268 wrote to memory of 432 268 sndhero.exe sndhero.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe"C:\Users\Admin\AppData\Local\Temp\0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe--c00745192⤵
- Suspicious behavior: RenamesItself
PID:1668
-
-
C:\Windows\SysWOW64\sndhero.exe"C:\Windows\SysWOW64\sndhero.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\sndhero.exe--ed199d192⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:432
-