Analysis
-
max time kernel
133s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
22-02-2022 19:18
Behavioral task
behavioral1
Sample
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe
-
Size
65KB
-
MD5
151b8048553fc049e478694822fe86af
-
SHA1
05c9624edbae54dbc770e5724be28ad137fe5a9a
-
SHA256
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32
-
SHA512
f503063747f0fcd9554416b2951db592c155306d24aadabaae7654b6c56522069687495775e4a51202c4a57175d0a0af5cbf517909dcaf45eec84d10de01bb1e
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
buildermedia.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 buildermedia.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE buildermedia.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies buildermedia.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 buildermedia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
buildermedia.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix buildermedia.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" buildermedia.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" buildermedia.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
buildermedia.exepid process 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe 4896 buildermedia.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exepid process 1288 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exebuildermedia.exedescription pid process target process PID 3528 wrote to memory of 1288 3528 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe PID 3528 wrote to memory of 1288 3528 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe PID 3528 wrote to memory of 1288 3528 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe 0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe PID 4960 wrote to memory of 4896 4960 buildermedia.exe buildermedia.exe PID 4960 wrote to memory of 4896 4960 buildermedia.exe buildermedia.exe PID 4960 wrote to memory of 4896 4960 buildermedia.exe buildermedia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe"C:\Users\Admin\AppData\Local\Temp\0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\0ef65813ab5ad90d728bfe951b2c23bb36e9cb25d4c76959525859be8b0c8c32.exe--c00745192⤵
- Suspicious behavior: RenamesItself
PID:1288
-
-
C:\Windows\SysWOW64\buildermedia.exe"C:\Windows\SysWOW64\buildermedia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\buildermedia.exe--1d1bf55b2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4896
-