Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 16:13
Static task
static1
Behavioral task
behavioral1
Sample
0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe
-
Size
556KB
-
MD5
60985097eabef1b073f9a6dd7d6b83a7
-
SHA1
c2c098460122d7d8f845b53ccdc38a094af520a3
-
SHA256
0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8
-
SHA512
436823e24970d5632b1d26fd358887d3af1a5feeb2c64ff103140eae5eb3a423573315241f24adfb7128598de2f99dfea4b8c5dd7e0e02ff3cc876c5f584c837
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exebuildiwamreg.exebuildiwamreg.exepid process 1092 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe 1092 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe 768 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe 768 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe 3856 buildiwamreg.exe 3856 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe 5096 buildiwamreg.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exepid process 768 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exebuildiwamreg.exedescription pid process target process PID 1092 wrote to memory of 768 1092 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe PID 1092 wrote to memory of 768 1092 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe PID 1092 wrote to memory of 768 1092 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe 0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe PID 3856 wrote to memory of 5096 3856 buildiwamreg.exe buildiwamreg.exe PID 3856 wrote to memory of 5096 3856 buildiwamreg.exe buildiwamreg.exe PID 3856 wrote to memory of 5096 3856 buildiwamreg.exe buildiwamreg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe"C:\Users\Admin\AppData\Local\Temp\0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe"C:\Users\Admin\AppData\Local\Temp\0f416f2a59558774bf4f6799231c2b441abae078912c3f2324db8c1e5b4ef5c8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:768
-
C:\Windows\SysWOW64\buildiwamreg.exe"C:\Windows\SysWOW64\buildiwamreg.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\buildiwamreg.exe"C:\Windows\SysWOW64\buildiwamreg.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096