Analysis
-
max time kernel
198s -
max time network
231s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11/06/2022, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe
-
Size
431KB
-
MD5
f8260ab4d6bf22cb50ac4281af1528be
-
SHA1
8dd7e1ed9b17082f07e13594ea03206d1482903f
-
SHA256
25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a
-
SHA512
223600c72e56827dee049b218007798d4f1e602048fcb2e8f9a795a9cb0c94396d6b8f9cc96dbd283e79ac3e8c60a7fbfe382629ededa6b6583b9e81be115092
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat adminsubs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0CFE2A2-E97D-4B35-AB8D-BB1D2C6B4A9E}\WpadDecision = "0" adminsubs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0CFE2A2-E97D-4B35-AB8D-BB1D2C6B4A9E}\aa-ad-90-86-eb-8e adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adminsubs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings adminsubs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-ad-90-86-eb-8e\WpadDecisionTime = 80a542c1d87dd801 adminsubs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings adminsubs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0CFE2A2-E97D-4B35-AB8D-BB1D2C6B4A9E}\WpadDecisionTime = 402f9282d87dd801 adminsubs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-ad-90-86-eb-8e adminsubs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-ad-90-86-eb-8e\WpadDecision = "0" adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adminsubs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0CFE2A2-E97D-4B35-AB8D-BB1D2C6B4A9E} adminsubs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0CFE2A2-E97D-4B35-AB8D-BB1D2C6B4A9E}\WpadDecisionReason = "1" adminsubs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0CFE2A2-E97D-4B35-AB8D-BB1D2C6B4A9E}\WpadNetworkName = "Network 2" adminsubs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-ad-90-86-eb-8e\WpadDecisionReason = "1" adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-ad-90-86-eb-8e\WpadDecisionTime = 402f9282d87dd801 adminsubs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-ad-90-86-eb-8e\WpadDetectedUrl adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0CFE2A2-E97D-4B35-AB8D-BB1D2C6B4A9E}\WpadDecisionTime = 80a542c1d87dd801 adminsubs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" adminsubs.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adminsubs.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 952 25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe 1300 25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe 1876 adminsubs.exe 1708 adminsubs.exe 1708 adminsubs.exe 1708 adminsubs.exe 1708 adminsubs.exe 1708 adminsubs.exe 1708 adminsubs.exe 1708 adminsubs.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1300 25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 952 wrote to memory of 1300 952 25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe 27 PID 952 wrote to memory of 1300 952 25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe 27 PID 952 wrote to memory of 1300 952 25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe 27 PID 952 wrote to memory of 1300 952 25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe 27 PID 1876 wrote to memory of 1708 1876 adminsubs.exe 29 PID 1876 wrote to memory of 1708 1876 adminsubs.exe 29 PID 1876 wrote to memory of 1708 1876 adminsubs.exe 29 PID 1876 wrote to memory of 1708 1876 adminsubs.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe"C:\Users\Admin\AppData\Local\Temp\25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe"C:\Users\Admin\AppData\Local\Temp\25aaecf7f0d2fbaf8860b11c8899982912aed82d8387e87d9938bcea89a0ba8a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1300
-
-
C:\Windows\SysWOW64\adminsubs.exe"C:\Windows\SysWOW64\adminsubs.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\adminsubs.exe"C:\Windows\SysWOW64\adminsubs.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1708
-