Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 17:03
Behavioral task
behavioral1
Sample
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe
-
Size
65KB
-
MD5
5dc208aee6abdb03ce16573d8a903f79
-
SHA1
6d80c21312405fa1a483ef8571aa817d3289322c
-
SHA256
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110
-
SHA512
1b64ebe553944d54a87415ee2c668a0dc1c304421c9783be828b93f7f44bbbb07218a77347ce1188aa55f4d3c1c97cbe09d11daaa25ddbd8f6e41eb1ceb2a6b1
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
asptlbtrouble.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 asptlbtrouble.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE asptlbtrouble.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies asptlbtrouble.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 asptlbtrouble.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
asptlbtrouble.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix asptlbtrouble.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" asptlbtrouble.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" asptlbtrouble.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
asptlbtrouble.exepid process 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe 2564 asptlbtrouble.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exepid process 1736 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exeasptlbtrouble.exedescription pid process target process PID 1584 wrote to memory of 1736 1584 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe PID 1584 wrote to memory of 1736 1584 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe PID 1584 wrote to memory of 1736 1584 a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe PID 2480 wrote to memory of 2564 2480 asptlbtrouble.exe asptlbtrouble.exe PID 2480 wrote to memory of 2564 2480 asptlbtrouble.exe asptlbtrouble.exe PID 2480 wrote to memory of 2564 2480 asptlbtrouble.exe asptlbtrouble.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe"C:\Users\Admin\AppData\Local\Temp\a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\a4e23373659f965548a4e075a41507f0657080944fcc78822e496b346cea1110.exe--575014762⤵
- Suspicious behavior: RenamesItself
PID:1736
-
-
C:\Windows\SysWOW64\asptlbtrouble.exe"C:\Windows\SysWOW64\asptlbtrouble.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\asptlbtrouble.exe--ba77b6012⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2564
-