Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 13:46
Behavioral task
behavioral1
Sample
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe
Resource
win10v2004-en-20220113
General
-
Target
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe
-
Size
62KB
-
MD5
d55debae7e5587c13005e43c05d2f1f0
-
SHA1
734d02cc5f9ca76ebc44084582af07997a657cb9
-
SHA256
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8
-
SHA512
076ae8b41d7fa125beb136d47c2cc4d790abbabc004019216aae2cba21d428561d602459b4184fa8e398f5b46078443e92a080cd72e892702422679c53917ff7
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
moveclass.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 moveclass.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE moveclass.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies moveclass.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 moveclass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
moveclass.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix moveclass.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" moveclass.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" moveclass.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
moveclass.exepid process 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe 1560 moveclass.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exepid process 892 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exemoveclass.exedescription pid process target process PID 608 wrote to memory of 892 608 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe PID 608 wrote to memory of 892 608 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe PID 608 wrote to memory of 892 608 f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe PID 1424 wrote to memory of 1560 1424 moveclass.exe moveclass.exe PID 1424 wrote to memory of 1560 1424 moveclass.exe moveclass.exe PID 1424 wrote to memory of 1560 1424 moveclass.exe moveclass.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe"C:\Users\Admin\AppData\Local\Temp\f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8.exe--9bd5906b2⤵
- Suspicious behavior: RenamesItself
PID:892
-
-
C:\Windows\SysWOW64\moveclass.exe"C:\Windows\SysWOW64\moveclass.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\moveclass.exe--c07c2edd2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1560
-