Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 14:19
Behavioral task
behavioral1
Sample
e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe
-
Size
58KB
-
MD5
776687c64bb358e34d0b162aac81b6e3
-
SHA1
3cf5269c81fed40ec8bf3eede5eeccc315d8b40e
-
SHA256
e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c
-
SHA512
4c56f650cf3b70326d84e37b9630880c633f61c5d49e782ce228cf07329f153671d5663362ae819c41bd5838b2ed46095e78fc3ac323ef675fd464915430245b
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
routercpls.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 routercpls.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE routercpls.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies routercpls.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 routercpls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
routercpls.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix routercpls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" routercpls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" routercpls.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
routercpls.exepid process 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe 2800 routercpls.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exepid process 1712 e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exeroutercpls.exedescription pid process target process PID 1516 wrote to memory of 1712 1516 e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe PID 1516 wrote to memory of 1712 1516 e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe PID 1516 wrote to memory of 1712 1516 e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe PID 2700 wrote to memory of 2800 2700 routercpls.exe routercpls.exe PID 2700 wrote to memory of 2800 2700 routercpls.exe routercpls.exe PID 2700 wrote to memory of 2800 2700 routercpls.exe routercpls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe"C:\Users\Admin\AppData\Local\Temp\e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\e50f8fd47455de0dbb75b38d0302ca736d03d3cc8f4a51b4620e55fe3466012c.exe--ff4ea5002⤵
- Suspicious behavior: RenamesItself
PID:1712
-
-
C:\Windows\SysWOW64\routercpls.exe"C:\Windows\SysWOW64\routercpls.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\routercpls.exe--83f038ef2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2800
-