Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 04:21
Static task
static1
Behavioral task
behavioral1
Sample
0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe
-
Size
176KB
-
MD5
53e9f2b5a7b01961f9f346581a5d7522
-
SHA1
300a775e5c1df294428511a87115ae07c97b94d6
-
SHA256
0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8
-
SHA512
2657dd26469ea44e5ed8a43760811ae67e1e58221cec720b7db0315fb6b60414181ee756c6a1418aad0326cacd9337cd49ac34c360e57c5bb6443886b7953072
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat bangjpn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{27C28520-6054-4863-B17B-01BC81D5A9A0}\fe-6a-0c-9c-e7-0c bangjpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections bangjpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings bangjpn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 bangjpn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{27C28520-6054-4863-B17B-01BC81D5A9A0}\WpadDecisionReason = "1" bangjpn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{27C28520-6054-4863-B17B-01BC81D5A9A0}\WpadDecision = "0" bangjpn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{27C28520-6054-4863-B17B-01BC81D5A9A0}\WpadDecisionTime = 40eb9ac1e873d801 bangjpn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-6a-0c-9c-e7-0c\WpadDecisionReason = "1" bangjpn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad bangjpn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{27C28520-6054-4863-B17B-01BC81D5A9A0} bangjpn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{27C28520-6054-4863-B17B-01BC81D5A9A0}\WpadNetworkName = "Network 3" bangjpn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-6a-0c-9c-e7-0c\WpadDecision = "0" bangjpn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-6a-0c-9c-e7-0c\WpadDecisionTime = 40eb9ac1e873d801 bangjpn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings bangjpn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 bangjpn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" bangjpn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 bangjpn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-6a-0c-9c-e7-0c bangjpn.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1984 0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe 1120 0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe 1052 bangjpn.exe 996 bangjpn.exe 996 bangjpn.exe 996 bangjpn.exe 996 bangjpn.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1120 0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1120 1984 0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe 27 PID 1984 wrote to memory of 1120 1984 0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe 27 PID 1984 wrote to memory of 1120 1984 0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe 27 PID 1984 wrote to memory of 1120 1984 0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe 27 PID 1052 wrote to memory of 996 1052 bangjpn.exe 29 PID 1052 wrote to memory of 996 1052 bangjpn.exe 29 PID 1052 wrote to memory of 996 1052 bangjpn.exe 29 PID 1052 wrote to memory of 996 1052 bangjpn.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe"C:\Users\Admin\AppData\Local\Temp\0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe"C:\Users\Admin\AppData\Local\Temp\0b11f581e4d4a3fa3cc31b94839c221ea8b386a341c880e0d49f739dc12182b8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1120
-
-
C:\Windows\SysWOW64\bangjpn.exe"C:\Windows\SysWOW64\bangjpn.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\bangjpn.exe"C:\Windows\SysWOW64\bangjpn.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:996
-