Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 18:26
Static task
static1
Behavioral task
behavioral1
Sample
181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe
-
Size
392KB
-
MD5
2786dfd0ed97686709bc57c8ad423e75
-
SHA1
a87120c4082f3bf46ac4a924e2479d2a317f43d4
-
SHA256
181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92
-
SHA512
b60e29ea0429700478447104b84ed3aeefe38ddb7914a354c18197eef502dd4fff2a308fe42d13c46c975f48c21d065879a205d6acfcf9cbdea13207d0d71833
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
texturenis.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 texturenis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE texturenis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies texturenis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 texturenis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
texturenis.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix texturenis.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" texturenis.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" texturenis.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
texturenis.exepid process 220 texturenis.exe 220 texturenis.exe 220 texturenis.exe 220 texturenis.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exepid process 1412 181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exetexturenis.exedescription pid process target process PID 4508 wrote to memory of 1412 4508 181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe 181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe PID 4508 wrote to memory of 1412 4508 181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe 181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe PID 4508 wrote to memory of 1412 4508 181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe 181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe PID 4048 wrote to memory of 220 4048 texturenis.exe texturenis.exe PID 4048 wrote to memory of 220 4048 texturenis.exe texturenis.exe PID 4048 wrote to memory of 220 4048 texturenis.exe texturenis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe"C:\Users\Admin\AppData\Local\Temp\181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\181e680869610b198f54c9a238ddf0f43847c9f2376cd22c3bb0c4dfd73d9f92.exe--2cbd08462⤵
- Suspicious behavior: RenamesItself
PID:1412
-
-
C:\Windows\SysWOW64\texturenis.exe"C:\Windows\SysWOW64\texturenis.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\texturenis.exe--ffa69c4f2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:220
-