Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 18:46
Static task
static1
Behavioral task
behavioral1
Sample
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe
Resource
win10v2004-20220414-en
General
-
Target
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe
-
Size
132KB
-
MD5
24bde49d5fa1232637c8cd6ca2108d96
-
SHA1
630b54ad204dc873fe97d5d37f8f3e47a61df47c
-
SHA256
095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e
-
SHA512
eb8e7cfbe91491bd9ef6a7d3e83dbd5c9f28a88063ab251d3c4367fb92ddfa3c32959155112616e9d06ac590d56541409d688294898c7f3d16a9bc7efeb35918
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 redistevents.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 redistevents.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE redistevents.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies redistevents.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" redistevents.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix redistevents.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" redistevents.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4756 redistevents.exe 4756 redistevents.exe 4756 redistevents.exe 4756 redistevents.exe 4756 redistevents.exe 4756 redistevents.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4872 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4872 4880 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 79 PID 4880 wrote to memory of 4872 4880 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 79 PID 4880 wrote to memory of 4872 4880 095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe 79 PID 740 wrote to memory of 4756 740 redistevents.exe 85 PID 740 wrote to memory of 4756 740 redistevents.exe 85 PID 740 wrote to memory of 4756 740 redistevents.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe"C:\Users\Admin\AppData\Local\Temp\095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\095d61dc49341cdbb30d3f20d37ae9e98edb011e7dbe52d2eac54b3102d4311e.exe--7823d41c2⤵
- Suspicious behavior: RenamesItself
PID:4872
-
-
C:\Windows\SysWOW64\redistevents.exe"C:\Windows\SysWOW64\redistevents.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\redistevents.exe--931503642⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4756
-