Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09-06-2022 08:25
Static task
static1
Behavioral task
behavioral1
Sample
151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe
-
Size
286KB
-
MD5
f201ccf75b52afa7295b6c662092f451
-
SHA1
eae01e6b635b96eb094ae64af49b6cac4c7656a5
-
SHA256
151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5
-
SHA512
8ade91f3731fd8fe35586be58f706c00ef9844f733fbe1cbf8a16e87d48a4a585453d6dcae2c57571f0ded91ebc838cf870e936db7e08997c15792ee96d32353
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat entrysmx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4\WpadDecisionReason = "1" entrysmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections entrysmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings entrysmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad entrysmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 entrysmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\0a-43-2e-98-cc-c4 entrysmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4\WpadDecision = "0" entrysmx.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings entrysmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 entrysmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadDecisionTime = f04d831b0e7cd801 entrysmx.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadNetworkName = "Network 3" entrysmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" entrysmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4\WpadDecisionTime = f04d831b0e7cd801 entrysmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-43-2e-98-cc-c4 entrysmx.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 entrysmx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED} entrysmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadDecisionReason = "1" entrysmx.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{DE0DBFFB-8459-4FD7-877A-F578FC5B79ED}\WpadDecision = "0" entrysmx.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1564 151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe 624 151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe 1204 entrysmx.exe 2012 entrysmx.exe 2012 entrysmx.exe 2012 entrysmx.exe 2012 entrysmx.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 624 151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1564 wrote to memory of 624 1564 151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe 27 PID 1564 wrote to memory of 624 1564 151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe 27 PID 1564 wrote to memory of 624 1564 151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe 27 PID 1564 wrote to memory of 624 1564 151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe 27 PID 1204 wrote to memory of 2012 1204 entrysmx.exe 29 PID 1204 wrote to memory of 2012 1204 entrysmx.exe 29 PID 1204 wrote to memory of 2012 1204 entrysmx.exe 29 PID 1204 wrote to memory of 2012 1204 entrysmx.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe"C:\Users\Admin\AppData\Local\Temp\151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe"C:\Users\Admin\AppData\Local\Temp\151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:624
-
-
C:\Windows\SysWOW64\entrysmx.exe"C:\Windows\SysWOW64\entrysmx.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\entrysmx.exe"C:\Windows\SysWOW64\entrysmx.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2012
-