Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    22/03/2022, 12:16

General

  • Target

    cpcrs.exe

  • Size

    419KB

  • MD5

    7d20fa01a703afa8907e50417d27b0a4

  • SHA1

    320116162d78afb8e00fd972591479a899d3dfee

  • SHA256

    3b2e708eaa4744c76a633391cf2c983f4a098b46436525619e5ea44e105355fe

  • SHA512

    0dcebe2598e6ccb51f0609831c93071421049eb924f83871e95c5a280af0d2e76630dfc47c5a2780eb18d55ee9690d6c83aabd8f1043cc2cdc21d9fe5425b892

Malware Config

Signatures

  • Drops file in Drivers directory 64 IoCs
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cpcrs.exe
    "C:\Users\Admin\AppData\Local\Temp\cpcrs.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4584
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:3256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3256-137-0x0000020AF6B80000-0x0000020AF6B90000-memory.dmp

    Filesize

    64KB

  • memory/3256-138-0x0000020AF7620000-0x0000020AF7630000-memory.dmp

    Filesize

    64KB

  • memory/3256-139-0x0000020AF9A00000-0x0000020AF9A04000-memory.dmp

    Filesize

    16KB

  • memory/4584-134-0x00000000005C0000-0x000000000062E000-memory.dmp

    Filesize

    440KB

  • memory/4584-135-0x00007FF839230000-0x00007FF839CF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4584-136-0x0000000002860000-0x0000000002862000-memory.dmp

    Filesize

    8KB