Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
31-05-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe
-
Size
76KB
-
MD5
fd44ad93ac7d143405c42e602cc431b2
-
SHA1
ed93622b49f73488a0aca7822aa668e9ac170fe6
-
SHA256
066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269
-
SHA512
4ee206ee11d23c144049b3c861b133a4f90e1a9bc0ab8ad3dd7360e399f27c8636deb46260e1c7e454369e78d4afeb059551819b25bdb6775e40e6926a8a9507
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies typpinned.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 typpinned.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 typpinned.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE typpinned.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" typpinned.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" typpinned.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix typpinned.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2484 typpinned.exe 2484 typpinned.exe 2484 typpinned.exe 2484 typpinned.exe 2484 typpinned.exe 2484 typpinned.exe 2484 typpinned.exe 2484 typpinned.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2032 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4648 wrote to memory of 2032 4648 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe 81 PID 4648 wrote to memory of 2032 4648 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe 81 PID 4648 wrote to memory of 2032 4648 066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe 81 PID 3628 wrote to memory of 2484 3628 typpinned.exe 83 PID 3628 wrote to memory of 2484 3628 typpinned.exe 83 PID 3628 wrote to memory of 2484 3628 typpinned.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe"C:\Users\Admin\AppData\Local\Temp\066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\066495f8ce07574b7244d091c351e32d0b4ca3bf596da18941f0e8821403f269.exe--baadc3d2⤵
- Suspicious behavior: RenamesItself
PID:2032
-
-
C:\Windows\SysWOW64\typpinned.exe"C:\Windows\SysWOW64\typpinned.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\typpinned.exe--fa134e992⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2484
-