Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-05-2022 21:18
Static task
static1
Behavioral task
behavioral1
Sample
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe
-
Size
148KB
-
MD5
adce284377cd66d0b73e10e7d01c20c1
-
SHA1
83f73b3e5add87fda0ea1b1962ab282122118687
-
SHA256
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c
-
SHA512
375af3e19e4a54f27343781207347248afff18bbfd52fe93e3f2666e88e5aca931f8e64d71d7e91136e32bd4769046b62379b4cebaee8598a2e3d14dca196d0f
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
svcsindexer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svcsindexer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
Processes:
svcsindexer.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D6029F8-E96C-44DF-8D85-CFA520C9AF43}\WpadDecision = "0" svcsindexer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svcsindexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svcsindexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D6029F8-E96C-44DF-8D85-CFA520C9AF43} svcsindexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D6029F8-E96C-44DF-8D85-CFA520C9AF43}\WpadDecisionTime = 1005f5b1b473d801 svcsindexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svcsindexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0067000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svcsindexer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-3d-2f-73-16-36\WpadDecisionReason = "1" svcsindexer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-3d-2f-73-16-36\WpadDecision = "0" svcsindexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svcsindexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-3d-2f-73-16-36 svcsindexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D6029F8-E96C-44DF-8D85-CFA520C9AF43}\d2-3d-2f-73-16-36 svcsindexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D6029F8-E96C-44DF-8D85-CFA520C9AF43}\WpadNetworkName = "Network 3" svcsindexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d2-3d-2f-73-16-36\WpadDecisionTime = 1005f5b1b473d801 svcsindexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svcsindexer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svcsindexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svcsindexer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D6029F8-E96C-44DF-8D85-CFA520C9AF43}\WpadDecisionReason = "1" svcsindexer.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exesvcsindexer.exesvcsindexer.exepid process 1824 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe 888 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe 1752 svcsindexer.exe 968 svcsindexer.exe 968 svcsindexer.exe 968 svcsindexer.exe 968 svcsindexer.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exepid process 888 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exesvcsindexer.exedescription pid process target process PID 1824 wrote to memory of 888 1824 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe PID 1824 wrote to memory of 888 1824 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe PID 1824 wrote to memory of 888 1824 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe PID 1824 wrote to memory of 888 1824 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe 0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe PID 1752 wrote to memory of 968 1752 svcsindexer.exe svcsindexer.exe PID 1752 wrote to memory of 968 1752 svcsindexer.exe svcsindexer.exe PID 1752 wrote to memory of 968 1752 svcsindexer.exe svcsindexer.exe PID 1752 wrote to memory of 968 1752 svcsindexer.exe svcsindexer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe"C:\Users\Admin\AppData\Local\Temp\0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe"C:\Users\Admin\AppData\Local\Temp\0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:888
-
C:\Windows\SysWOW64\svcsindexer.exe"C:\Windows\SysWOW64\svcsindexer.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\svcsindexer.exe"C:\Windows\SysWOW64\svcsindexer.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:968