Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 18:48
Static task
static1
Behavioral task
behavioral1
Sample
1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe
-
Size
379KB
-
MD5
4042f9b434b667cc9ba1c96715a1a79e
-
SHA1
d784d12a497447a266cbaa1bf3807df5b14d640c
-
SHA256
1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918
-
SHA512
c1243c2d46f066d94d3fb4a9a0e5c2aafe4abc5593eeb4d16a1e342044b4d20ebb93a185f588f49849c9a51a44368e438e16c49d63d0d182a4bcaecb4d3e16ab
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
adtrandom.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE adtrandom.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies adtrandom.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 adtrandom.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 adtrandom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
adtrandom.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix adtrandom.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" adtrandom.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" adtrandom.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
adtrandom.exepid process 1540 adtrandom.exe 1540 adtrandom.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exepid process 4036 1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exeadtrandom.exedescription pid process target process PID 4772 wrote to memory of 4036 4772 1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe 1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe PID 4772 wrote to memory of 4036 4772 1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe 1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe PID 4772 wrote to memory of 4036 4772 1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe 1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe PID 4568 wrote to memory of 1540 4568 adtrandom.exe adtrandom.exe PID 4568 wrote to memory of 1540 4568 adtrandom.exe adtrandom.exe PID 4568 wrote to memory of 1540 4568 adtrandom.exe adtrandom.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe"C:\Users\Admin\AppData\Local\Temp\1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\1b6aa692ba88e13ddec659e9c601d305146fba99e16181467cdfe49c7b109918.exe--cd45514a2⤵
- Suspicious behavior: RenamesItself
PID:4036
-
-
C:\Windows\SysWOW64\adtrandom.exe"C:\Windows\SysWOW64\adtrandom.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\adtrandom.exe--56baca2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1540
-