Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 18:28
Behavioral task
behavioral1
Sample
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe
-
Size
59KB
-
MD5
5748520230e32823cbc44c721687351a
-
SHA1
4a63a4edf47b4580b117c2f3598e2c967551997b
-
SHA256
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6
-
SHA512
1030356b915e3409c449c59c87d8ade9198134e96eee1db6bba39e2bad7f2df853c32146567fe2ebb7ad8fff3b2c628a3d767f591ca3a68accabe75c132f5a56
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
tasksipsm.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat tasksipsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
tasksipsm.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0086000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 tasksipsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D30ABE8B-D206-49DC-A416-17EBD1F6D19C}\WpadDecision = "0" tasksipsm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D30ABE8B-D206-49DC-A416-17EBD1F6D19C}\WpadNetworkName = "Network 3" tasksipsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-63-c1-d4-8a-b8 tasksipsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections tasksipsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings tasksipsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" tasksipsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D30ABE8B-D206-49DC-A416-17EBD1F6D19C}\WpadDecisionReason = "1" tasksipsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D30ABE8B-D206-49DC-A416-17EBD1F6D19C}\WpadDecisionTime = 90a4d8659031d801 tasksipsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-63-c1-d4-8a-b8\WpadDecisionTime = 90a4d8659031d801 tasksipsm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings tasksipsm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" tasksipsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad tasksipsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D30ABE8B-D206-49DC-A416-17EBD1F6D19C} tasksipsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-63-c1-d4-8a-b8\WpadDecision = "0" tasksipsm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix tasksipsm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" tasksipsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 tasksipsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D30ABE8B-D206-49DC-A416-17EBD1F6D19C}\86-63-c1-d4-8a-b8 tasksipsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-63-c1-d4-8a-b8\WpadDecisionReason = "1" tasksipsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 tasksipsm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
tasksipsm.exepid process 776 tasksipsm.exe 776 tasksipsm.exe 776 tasksipsm.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exepid process 764 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exetasksipsm.exedescription pid process target process PID 1796 wrote to memory of 764 1796 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe PID 1796 wrote to memory of 764 1796 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe PID 1796 wrote to memory of 764 1796 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe PID 1796 wrote to memory of 764 1796 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe PID 1552 wrote to memory of 776 1552 tasksipsm.exe tasksipsm.exe PID 1552 wrote to memory of 776 1552 tasksipsm.exe tasksipsm.exe PID 1552 wrote to memory of 776 1552 tasksipsm.exe tasksipsm.exe PID 1552 wrote to memory of 776 1552 tasksipsm.exe tasksipsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe"C:\Users\Admin\AppData\Local\Temp\8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe--fa3590352⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\tasksipsm.exe"C:\Windows\SysWOW64\tasksipsm.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasksipsm.exe--d251a2c52⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/764-55-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB