Analysis
-
max time kernel
146s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 13:10
Static task
static1
Behavioral task
behavioral1
Sample
10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe
-
Size
448KB
-
MD5
d984329d7732da39de1085ac9cdcb428
-
SHA1
ce1fe98f8e01e9e721b8af936aac9f315ffd7ba4
-
SHA256
10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2
-
SHA512
1d3e167d6f1f9e201251ecfd5a649bcb438db26fb2f53495264ae04744838aba8c0293898e7867e9c9e12f46915c0de80b11146b8e68c4e7ffdd9ce4815d8b0f
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat restartcbgnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings restartcbgnd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" restartcbgnd.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 restartcbgnd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-13-30-0f-81-7f restartcbgnd.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 restartcbgnd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad restartcbgnd.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 restartcbgnd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D49C9CD8-D319-4850-AB24-C5DEA2ECBB63}\WpadDecision = "0" restartcbgnd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D49C9CD8-D319-4850-AB24-C5DEA2ECBB63}\WpadNetworkName = "Network 3" restartcbgnd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-13-30-0f-81-7f\WpadDecisionReason = "1" restartcbgnd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-13-30-0f-81-7f\WpadDecision = "0" restartcbgnd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections restartcbgnd.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D49C9CD8-D319-4850-AB24-C5DEA2ECBB63}\WpadDecisionReason = "1" restartcbgnd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D49C9CD8-D319-4850-AB24-C5DEA2ECBB63}\fa-13-30-0f-81-7f restartcbgnd.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-13-30-0f-81-7f\WpadDecisionTime = a023385c4178d801 restartcbgnd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings restartcbgnd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D49C9CD8-D319-4850-AB24-C5DEA2ECBB63} restartcbgnd.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D49C9CD8-D319-4850-AB24-C5DEA2ECBB63}\WpadDecisionTime = a023385c4178d801 restartcbgnd.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1956 10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe 1048 10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe 1964 restartcbgnd.exe 1952 restartcbgnd.exe 1952 restartcbgnd.exe 1952 restartcbgnd.exe 1952 restartcbgnd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1048 10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1048 1956 10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe 28 PID 1956 wrote to memory of 1048 1956 10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe 28 PID 1956 wrote to memory of 1048 1956 10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe 28 PID 1956 wrote to memory of 1048 1956 10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe 28 PID 1964 wrote to memory of 1952 1964 restartcbgnd.exe 30 PID 1964 wrote to memory of 1952 1964 restartcbgnd.exe 30 PID 1964 wrote to memory of 1952 1964 restartcbgnd.exe 30 PID 1964 wrote to memory of 1952 1964 restartcbgnd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe"C:\Users\Admin\AppData\Local\Temp\10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe"C:\Users\Admin\AppData\Local\Temp\10339b0cc22729340f8e538735d29b8839fe325bb8d4f70a33026765dd7f71b2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1048
-
-
C:\Windows\SysWOW64\restartcbgnd.exe"C:\Windows\SysWOW64\restartcbgnd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\restartcbgnd.exe"C:\Windows\SysWOW64\restartcbgnd.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1952
-