Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 17:12
Static task
static1
Behavioral task
behavioral1
Sample
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe
-
Size
140KB
-
MD5
db298d024b82bba33c2744fe5472f217
-
SHA1
3960999598f3e7a42b31357b2b0ea2677d7a81a2
-
SHA256
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163
-
SHA512
75b3916d0ad21386630e375b0cf4fda4f794dd9b59c2e7ed4869522842650ef2a520682c43c7730d0a45d4dd5015cd797f19d316da0f78fc67a425dd2d14b0d8
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
wscapimarkers.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wscapimarkers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
wscapimarkers.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wscapimarkers.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wscapimarkers.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wscapimarkers.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F89AED28-36C9-44BA-B75A-D975843AC504} wscapimarkers.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F89AED28-36C9-44BA-B75A-D975843AC504}\WpadDecision = "0" wscapimarkers.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wscapimarkers.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wscapimarkers.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F89AED28-36C9-44BA-B75A-D975843AC504}\WpadNetworkName = "Network" wscapimarkers.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-70-1a-3f-ec wscapimarkers.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-70-1a-3f-ec\WpadDecisionTime = 10c7612f797bd801 wscapimarkers.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-70-1a-3f-ec\WpadDecision = "0" wscapimarkers.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wscapimarkers.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wscapimarkers.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0092000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wscapimarkers.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F89AED28-36C9-44BA-B75A-D975843AC504}\WpadDecisionReason = "1" wscapimarkers.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F89AED28-36C9-44BA-B75A-D975843AC504}\WpadDecisionTime = 10c7612f797bd801 wscapimarkers.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wscapimarkers.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wscapimarkers.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wscapimarkers.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F89AED28-36C9-44BA-B75A-D975843AC504}\26-51-70-1a-3f-ec wscapimarkers.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-70-1a-3f-ec\WpadDecisionReason = "1" wscapimarkers.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exewscapimarkers.exewscapimarkers.exepid process 1764 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 908 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 1288 wscapimarkers.exe 1380 wscapimarkers.exe 1380 wscapimarkers.exe 1380 wscapimarkers.exe 1380 wscapimarkers.exe 1380 wscapimarkers.exe 1380 wscapimarkers.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exepid process 908 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exewscapimarkers.exedescription pid process target process PID 1764 wrote to memory of 908 1764 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe PID 1764 wrote to memory of 908 1764 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe PID 1764 wrote to memory of 908 1764 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe PID 1764 wrote to memory of 908 1764 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe PID 1288 wrote to memory of 1380 1288 wscapimarkers.exe wscapimarkers.exe PID 1288 wrote to memory of 1380 1288 wscapimarkers.exe wscapimarkers.exe PID 1288 wrote to memory of 1380 1288 wscapimarkers.exe wscapimarkers.exe PID 1288 wrote to memory of 1380 1288 wscapimarkers.exe wscapimarkers.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:908
-
-
C:\Windows\SysWOW64\wscapimarkers.exe"C:\Windows\SysWOW64\wscapimarkers.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\wscapimarkers.exe"C:\Windows\SysWOW64\wscapimarkers.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1380
-