Analysis
-
max time kernel
153s -
max time network
169s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
23-02-2022 00:11
Behavioral task
behavioral1
Sample
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe
-
Size
57KB
-
MD5
2011ab041b49e369b839a698825122f4
-
SHA1
3eef2a377bff983f8c4887d3d839f2a8118698f3
-
SHA256
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625
-
SHA512
4cb3177a3c71225b19f3788a56eb90685c538a4d02c652e6d77bcbcccbd529e207392bb1ffae5b5b2518bab024bdc7af6b352453f6ca1c229820ee70c53a11de
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
partnerspooler.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat partnerspooler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 25 IoCs
Processes:
partnerspooler.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad partnerspooler.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-03-b2-58-05-47\WpadDecisionReason = "1" partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadDecisionTime = 30a86f025928d801 partnerspooler.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 partnerspooler.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadDecision = "0" partnerspooler.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadNetworkName = "Network 3" partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-03-b2-58-05-47\WpadDecisionTime = 50f9b6c25828d801 partnerspooler.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 partnerspooler.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadDecisionReason = "1" partnerspooler.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3} partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadDecisionTime = 50f9b6c25828d801 partnerspooler.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix partnerspooler.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" partnerspooler.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" partnerspooler.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings partnerspooler.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 partnerspooler.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-03-b2-58-05-47 partnerspooler.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\3e-03-b2-58-05-47 partnerspooler.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-03-b2-58-05-47\WpadDecision = "0" partnerspooler.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-03-b2-58-05-47\WpadDetectedUrl partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 partnerspooler.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-03-b2-58-05-47\WpadDecisionTime = 30a86f025928d801 partnerspooler.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
partnerspooler.exepid process 608 partnerspooler.exe 608 partnerspooler.exe 608 partnerspooler.exe 608 partnerspooler.exe 608 partnerspooler.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exepid process 788 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exepartnerspooler.exedescription pid process target process PID 732 wrote to memory of 788 732 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe PID 732 wrote to memory of 788 732 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe PID 732 wrote to memory of 788 732 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe PID 732 wrote to memory of 788 732 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe PID 1444 wrote to memory of 608 1444 partnerspooler.exe partnerspooler.exe PID 1444 wrote to memory of 608 1444 partnerspooler.exe partnerspooler.exe PID 1444 wrote to memory of 608 1444 partnerspooler.exe partnerspooler.exe PID 1444 wrote to memory of 608 1444 partnerspooler.exe partnerspooler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe"C:\Users\Admin\AppData\Local\Temp\03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe--4a1f6cf32⤵
- Suspicious behavior: RenamesItself
PID:788
-
-
C:\Windows\SysWOW64\partnerspooler.exe"C:\Windows\SysWOW64\partnerspooler.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\partnerspooler.exe--72df95862⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:608
-