Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 16:10
Behavioral task
behavioral1
Sample
b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe
-
Size
70KB
-
MD5
5456e6445d95334f5124c1a086a189af
-
SHA1
cd74c58e422ca15bb6beb2525bb0379e0d168509
-
SHA256
b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6
-
SHA512
72db6f95d8704e2a0721b3a8d043681e00072de7caecebdc325cc249376b0ff17f66257497e72d4af9d76508d43a6a46d75cb34eb6876fba56b991f05c72f286
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
wimmem.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wimmem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
wimmem.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-ca-d3-f8-e6-56 wimmem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-ca-d3-f8-e6-56\WpadDecisionTime = 106fe1b07e31d801 wimmem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-ca-d3-f8-e6-56\WpadDecision = "0" wimmem.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wimmem.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wimmem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadDecisionReason = "1" wimmem.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadNetworkName = "Network 3" wimmem.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wimmem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadDecision = "0" wimmem.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\06-ca-d3-f8-e6-56 wimmem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-ca-d3-f8-e6-56\WpadDecisionReason = "1" wimmem.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wimmem.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wimmem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wimmem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wimmem.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3} wimmem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B55FA078-758F-4FEE-80CC-20EC7480DBC3}\WpadDecisionTime = 106fe1b07e31d801 wimmem.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wimmem.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wimmem.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wimmem.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wimmem.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
wimmem.exepid process 316 wimmem.exe 316 wimmem.exe 316 wimmem.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exepid process 948 b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exewimmem.exedescription pid process target process PID 1612 wrote to memory of 948 1612 b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe PID 1612 wrote to memory of 948 1612 b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe PID 1612 wrote to memory of 948 1612 b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe PID 1612 wrote to memory of 948 1612 b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe PID 1376 wrote to memory of 316 1376 wimmem.exe wimmem.exe PID 1376 wrote to memory of 316 1376 wimmem.exe wimmem.exe PID 1376 wrote to memory of 316 1376 wimmem.exe wimmem.exe PID 1376 wrote to memory of 316 1376 wimmem.exe wimmem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe"C:\Users\Admin\AppData\Local\Temp\b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\b9c7d471ba8f1ebabe835982ca79cad248f43214be81bb4db3709b88cd1f80f6.exe--5ecb3f922⤵
- Suspicious behavior: RenamesItself
PID:948
-
-
C:\Windows\SysWOW64\wimmem.exe"C:\Windows\SysWOW64\wimmem.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\wimmem.exe--dccfaf4c2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:316
-