Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 13:46
Behavioral task
behavioral1
Sample
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe
Resource
win10v2004-en-20220113
General
-
Target
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe
-
Size
62KB
-
MD5
d55debae7e5587c13005e43c05d2f1f0
-
SHA1
734d02cc5f9ca76ebc44084582af07997a657cb9
-
SHA256
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8
-
SHA512
076ae8b41d7fa125beb136d47c2cc4d790abbabc004019216aae2cba21d428561d602459b4184fa8e398f5b46078443e92a080cd72e892702422679c53917ff7
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
fwdrcpls.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat fwdrcpls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
fwdrcpls.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" fwdrcpls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings fwdrcpls.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" fwdrcpls.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 fwdrcpls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34BD48DE-A279-4790-846B-8E729D839311} fwdrcpls.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-81-83-2a-63-ab\WpadDecision = "0" fwdrcpls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections fwdrcpls.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 fwdrcpls.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0089000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 fwdrcpls.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34BD48DE-A279-4790-846B-8E729D839311}\WpadDecisionTime = 8065fbb86931d801 fwdrcpls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34BD48DE-A279-4790-846B-8E729D839311}\1e-81-83-2a-63-ab fwdrcpls.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-81-83-2a-63-ab\WpadDecisionReason = "1" fwdrcpls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-81-83-2a-63-ab fwdrcpls.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings fwdrcpls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix fwdrcpls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" fwdrcpls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad fwdrcpls.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34BD48DE-A279-4790-846B-8E729D839311}\WpadDecisionReason = "1" fwdrcpls.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34BD48DE-A279-4790-846B-8E729D839311}\WpadDecision = "0" fwdrcpls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34BD48DE-A279-4790-846B-8E729D839311}\WpadNetworkName = "Network 3" fwdrcpls.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-81-83-2a-63-ab\WpadDecisionTime = 8065fbb86931d801 fwdrcpls.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
fwdrcpls.exepid process 584 fwdrcpls.exe 584 fwdrcpls.exe 584 fwdrcpls.exe 584 fwdrcpls.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exepid process 1964 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exefwdrcpls.exedescription pid process target process PID 1832 wrote to memory of 1964 1832 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe PID 1832 wrote to memory of 1964 1832 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe PID 1832 wrote to memory of 1964 1832 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe PID 1832 wrote to memory of 1964 1832 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe PID 520 wrote to memory of 584 520 fwdrcpls.exe fwdrcpls.exe PID 520 wrote to memory of 584 520 fwdrcpls.exe fwdrcpls.exe PID 520 wrote to memory of 584 520 fwdrcpls.exe fwdrcpls.exe PID 520 wrote to memory of 584 520 fwdrcpls.exe fwdrcpls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe"C:\Users\Admin\AppData\Local\Temp\f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe--9bd5906b2⤵
- Suspicious behavior: RenamesItself
PID:1964
-
-
C:\Windows\SysWOW64\fwdrcpls.exe"C:\Windows\SysWOW64\fwdrcpls.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\fwdrcpls.exe--37d917852⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:584
-