Analysis
-
max time kernel
172s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 17:12
Static task
static1
Behavioral task
behavioral1
Sample
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe
-
Size
140KB
-
MD5
db298d024b82bba33c2744fe5472f217
-
SHA1
3960999598f3e7a42b31357b2b0ea2677d7a81a2
-
SHA256
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163
-
SHA512
75b3916d0ad21386630e375b0cf4fda4f794dd9b59c2e7ed4869522842650ef2a520682c43c7730d0a45d4dd5015cd797f19d316da0f78fc67a425dd2d14b0d8
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
waitals.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies waitals.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 waitals.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 waitals.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE waitals.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
waitals.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" waitals.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" waitals.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix waitals.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exewaitals.exewaitals.exepid process 904 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 904 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 4644 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 4644 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 3620 waitals.exe 3620 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe 3916 waitals.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exepid process 4644 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exewaitals.exedescription pid process target process PID 904 wrote to memory of 4644 904 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe PID 904 wrote to memory of 4644 904 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe PID 904 wrote to memory of 4644 904 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe 18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe PID 3620 wrote to memory of 3916 3620 waitals.exe waitals.exe PID 3620 wrote to memory of 3916 3620 waitals.exe waitals.exe PID 3620 wrote to memory of 3916 3620 waitals.exe waitals.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"C:\Users\Admin\AppData\Local\Temp\18800172b307039b3c4450e9deb66b6890de64a077d37dab4228c621cfa47163.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4644
-
-
C:\Windows\SysWOW64\waitals.exe"C:\Windows\SysWOW64\waitals.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\waitals.exe"C:\Windows\SysWOW64\waitals.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3916
-