Analysis
-
max time kernel
132s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 18:28
Behavioral task
behavioral1
Sample
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe
-
Size
59KB
-
MD5
5748520230e32823cbc44c721687351a
-
SHA1
4a63a4edf47b4580b117c2f3598e2c967551997b
-
SHA256
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6
-
SHA512
1030356b915e3409c449c59c87d8ade9198134e96eee1db6bba39e2bad7f2df853c32146567fe2ebb7ad8fff3b2c628a3d767f591ca3a68accabe75c132f5a56
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
substran.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE substran.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies substran.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 substran.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 substran.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
substran.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix substran.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" substran.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" substran.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
substran.exepid process 3820 substran.exe 3820 substran.exe 3820 substran.exe 3820 substran.exe 3820 substran.exe 3820 substran.exe 3820 substran.exe 3820 substran.exe 3820 substran.exe 3820 substran.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exepid process 2136 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exesubstran.exedescription pid process target process PID 1740 wrote to memory of 2136 1740 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe PID 1740 wrote to memory of 2136 1740 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe PID 1740 wrote to memory of 2136 1740 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe 8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe PID 1404 wrote to memory of 3820 1404 substran.exe substran.exe PID 1404 wrote to memory of 3820 1404 substran.exe substran.exe PID 1404 wrote to memory of 3820 1404 substran.exe substran.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe"C:\Users\Admin\AppData\Local\Temp\8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8c6389fc67ddcd8b8342a02825b3278e7722a319ccc71dbccdd5bbcebb7997a6.exe--fa3590352⤵
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\substran.exe"C:\Windows\SysWOW64\substran.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\substran.exe--be76cbb02⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses