Analysis
-
max time kernel
159s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
23-02-2022 00:11
Behavioral task
behavioral1
Sample
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe
-
Size
57KB
-
MD5
2011ab041b49e369b839a698825122f4
-
SHA1
3eef2a377bff983f8c4887d3d839f2a8118698f3
-
SHA256
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625
-
SHA512
4cb3177a3c71225b19f3788a56eb90685c538a4d02c652e6d77bcbcccbd529e207392bb1ffae5b5b2518bab024bdc7af6b352453f6ca1c229820ee70c53a11de
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
rowsetripple.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies rowsetripple.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 rowsetripple.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 rowsetripple.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE rowsetripple.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
rowsetripple.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rowsetripple.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rowsetripple.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rowsetripple.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rowsetripple.exepid process 3768 rowsetripple.exe 3768 rowsetripple.exe 3768 rowsetripple.exe 3768 rowsetripple.exe 3768 rowsetripple.exe 3768 rowsetripple.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exepid process 3988 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exerowsetripple.exedescription pid process target process PID 532 wrote to memory of 3988 532 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe PID 532 wrote to memory of 3988 532 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe PID 532 wrote to memory of 3988 532 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe 03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe PID 3284 wrote to memory of 3768 3284 rowsetripple.exe rowsetripple.exe PID 3284 wrote to memory of 3768 3284 rowsetripple.exe rowsetripple.exe PID 3284 wrote to memory of 3768 3284 rowsetripple.exe rowsetripple.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe"C:\Users\Admin\AppData\Local\Temp\03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\03d0e11cd6ce3081ca5ac6958d50eba76959d657afe76b52c846524b05655625.exe--4a1f6cf32⤵
- Suspicious behavior: RenamesItself
PID:3988
-
-
C:\Windows\SysWOW64\rowsetripple.exe"C:\Windows\SysWOW64\rowsetripple.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\rowsetripple.exe--f14f50a2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:3780