Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 17:03
Behavioral task
behavioral1
Sample
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe
-
Size
65KB
-
MD5
5dc208aee6abdb03ce16573d8a903f79
-
SHA1
6d80c21312405fa1a483ef8571aa817d3289322c
-
SHA256
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110
-
SHA512
1b64ebe553944d54a87415ee2c668a0dc1c304421c9783be828b93f7f44bbbb07218a77347ce1188aa55f4d3c1c97cbe09d11daaa25ddbd8f6e41eb1ceb2a6b1
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
whileordered.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat whileordered.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
whileordered.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-35-c6-f5-1d-95\WpadDecision = "0" whileordered.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections whileordered.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F75BEC84-6DCD-409E-87E8-E080D430F729} whileordered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F75BEC84-6DCD-409E-87E8-E080D430F729}\WpadDecision = "0" whileordered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-35-c6-f5-1d-95\WpadDecisionTime = 009e0adf8531d801 whileordered.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F75BEC84-6DCD-409E-87E8-E080D430F729}\ba-35-c6-f5-1d-95 whileordered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix whileordered.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings whileordered.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad whileordered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0084000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 whileordered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" whileordered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F75BEC84-6DCD-409E-87E8-E080D430F729}\WpadNetworkName = "Network 3" whileordered.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-35-c6-f5-1d-95 whileordered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ba-35-c6-f5-1d-95\WpadDecisionReason = "1" whileordered.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings whileordered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 whileordered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" whileordered.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" whileordered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 whileordered.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F75BEC84-6DCD-409E-87E8-E080D430F729}\WpadDecisionReason = "1" whileordered.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F75BEC84-6DCD-409E-87E8-E080D430F729}\WpadDecisionTime = 009e0adf8531d801 whileordered.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
whileordered.exepid process 904 whileordered.exe 904 whileordered.exe 904 whileordered.exe 904 whileordered.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exepid process 1624 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exewhileordered.exedescription pid process target process PID 1620 wrote to memory of 1624 1620 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe PID 1620 wrote to memory of 1624 1620 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe PID 1620 wrote to memory of 1624 1620 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe PID 1620 wrote to memory of 1624 1620 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe PID 516 wrote to memory of 904 516 whileordered.exe whileordered.exe PID 516 wrote to memory of 904 516 whileordered.exe whileordered.exe PID 516 wrote to memory of 904 516 whileordered.exe whileordered.exe PID 516 wrote to memory of 904 516 whileordered.exe whileordered.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe"C:\Users\Admin\AppData\Local\Temp\a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe--575014762⤵
- Suspicious behavior: RenamesItself
PID:1624
-
-
C:\Windows\SysWOW64\whileordered.exe"C:\Windows\SysWOW64\whileordered.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\whileordered.exe--6e0e404e2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:904
-