Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
31-05-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe
-
Size
76KB
-
MD5
fd44ad93ac7d143405c42e602cc431b2
-
SHA1
ed93622b49f73488a0aca7822aa668e9ac170fe6
-
SHA256
066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269
-
SHA512
4ee206ee11d23c144049b3c861b133a4f90e1a9bc0ab8ad3dd7360e399f27c8636deb46260e1c7e454369e78d4afeb059551819b25bdb6775e40e6926a8a9507
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat portalcomment.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" portalcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0E08E403-C35A-4CE9-A177-2C5EA722991E}\WpadDecision = "0" portalcomment.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-7f-8d-95-d6-1c portalcomment.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0E08E403-C35A-4CE9-A177-2C5EA722991E}\8e-7f-8d-95-d6-1c portalcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-7f-8d-95-d6-1c\WpadDecisionReason = "1" portalcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 portalcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" portalcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0E08E403-C35A-4CE9-A177-2C5EA722991E}\WpadDecisionReason = "1" portalcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0E08E403-C35A-4CE9-A177-2C5EA722991E}\WpadDecisionTime = 8035944ad674d801 portalcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections portalcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ad000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 portalcomment.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0E08E403-C35A-4CE9-A177-2C5EA722991E} portalcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0E08E403-C35A-4CE9-A177-2C5EA722991E}\WpadNetworkName = "Network 3" portalcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 portalcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad portalcomment.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-7f-8d-95-d6-1c\WpadDecisionTime = 8035944ad674d801 portalcomment.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-7f-8d-95-d6-1c\WpadDecision = "0" portalcomment.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings portalcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix portalcomment.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" portalcomment.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings portalcomment.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1524 portalcomment.exe 1524 portalcomment.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 316 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1368 wrote to memory of 316 1368 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe 28 PID 1368 wrote to memory of 316 1368 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe 28 PID 1368 wrote to memory of 316 1368 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe 28 PID 1368 wrote to memory of 316 1368 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe 28 PID 1792 wrote to memory of 1524 1792 portalcomment.exe 30 PID 1792 wrote to memory of 1524 1792 portalcomment.exe 30 PID 1792 wrote to memory of 1524 1792 portalcomment.exe 30 PID 1792 wrote to memory of 1524 1792 portalcomment.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe"C:\Users\Admin\AppData\Local\Temp\066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe--baadc3d2⤵
- Suspicious behavior: RenamesItself
PID:316
-
-
C:\Windows\SysWOW64\portalcomment.exe"C:\Windows\SysWOW64\portalcomment.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\portalcomment.exe--89b829492⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1524
-