Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 20:14
Behavioral task
behavioral1
Sample
7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe
-
Size
58KB
-
MD5
8e7208eb64c1d0081c7f1fb31be0f82a
-
SHA1
9ef1d16d997e656a24cc34e0aa4121521166d63f
-
SHA256
7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77
-
SHA512
765289eeddde4a43ae9c870aadb901a01564f6552415d5c2bfbb8e18792b3b0db2ecedd826fbce8cf0925a5dc276756eb3d58f1862455f732fe994dcda7d1528
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
tlbrus.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tlbrus.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 tlbrus.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tlbrus.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tlbrus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
tlbrus.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix tlbrus.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" tlbrus.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" tlbrus.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
tlbrus.exepid process 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe 4580 tlbrus.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exepid process 4320 7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exetlbrus.exedescription pid process target process PID 4336 wrote to memory of 4320 4336 7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe 7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe PID 4336 wrote to memory of 4320 4336 7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe 7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe PID 4336 wrote to memory of 4320 4336 7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe 7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe PID 4764 wrote to memory of 4580 4764 tlbrus.exe tlbrus.exe PID 4764 wrote to memory of 4580 4764 tlbrus.exe tlbrus.exe PID 4764 wrote to memory of 4580 4764 tlbrus.exe tlbrus.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe"C:\Users\Admin\AppData\Local\Temp\7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\7f3e486aa756ead0ab26785b70608e6bd601abc3187e3364d7399d879654fd77.exe--eaf6d9062⤵
- Suspicious behavior: RenamesItself
PID:4320
-
-
C:\Windows\SysWOW64\tlbrus.exe"C:\Windows\SysWOW64\tlbrus.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\tlbrus.exe--697cf5d82⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4580
-