Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe
-
Size
348KB
-
MD5
4d12ca95ea970a75d97c63d920e7a90c
-
SHA1
9f029bcf682c4ab3101a9acb10dc27ab7bb3ca02
-
SHA256
2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7
-
SHA512
94f2de2b01ef0619113e7a0856f3df48263fda985330a0b77a48f4e85ac3c33de05b311aa961a4686a78fead1bcf56574abbfae588e15477da084936a9479128
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
cofiregdi.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat cofiregdi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 22 IoCs
Processes:
cofiregdi.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F8C24E7-D394-4DAC-9EE9-717E73884251} cofiregdi.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-f4-51-c6-82-c4 cofiregdi.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F8C24E7-D394-4DAC-9EE9-717E73884251}\86-f4-51-c6-82-c4 cofiregdi.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-f4-51-c6-82-c4\WpadDecision = "0" cofiregdi.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings cofiregdi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cofiregdi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F8C24E7-D394-4DAC-9EE9-717E73884251}\WpadDecisionTime = 2082b6f2c780d801 cofiregdi.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" cofiregdi.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F8C24E7-D394-4DAC-9EE9-717E73884251}\WpadDecisionReason = "1" cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-f4-51-c6-82-c4\WpadDecisionTime = 2033dbb3c780d801 cofiregdi.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-f4-51-c6-82-c4\WpadDetectedUrl cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-f4-51-c6-82-c4\WpadDecisionTime = 2082b6f2c780d801 cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cofiregdi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cofiregdi.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-f4-51-c6-82-c4\WpadDecisionReason = "1" cofiregdi.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F8C24E7-D394-4DAC-9EE9-717E73884251}\WpadDecisionTime = 2033dbb3c780d801 cofiregdi.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F8C24E7-D394-4DAC-9EE9-717E73884251}\WpadDecision = "0" cofiregdi.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F8C24E7-D394-4DAC-9EE9-717E73884251}\WpadNetworkName = "Network 3" cofiregdi.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.execofiregdi.execofiregdi.exepid Process 2040 2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe 992 2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe 1732 cofiregdi.exe 1924 cofiregdi.exe 1924 cofiregdi.exe 1924 cofiregdi.exe 1924 cofiregdi.exe 1924 cofiregdi.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exepid Process 992 2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.execofiregdi.exedescription pid Process procid_target PID 2040 wrote to memory of 992 2040 2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe 27 PID 2040 wrote to memory of 992 2040 2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe 27 PID 2040 wrote to memory of 992 2040 2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe 27 PID 2040 wrote to memory of 992 2040 2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe 27 PID 1732 wrote to memory of 1924 1732 cofiregdi.exe 29 PID 1732 wrote to memory of 1924 1732 cofiregdi.exe 29 PID 1732 wrote to memory of 1924 1732 cofiregdi.exe 29 PID 1732 wrote to memory of 1924 1732 cofiregdi.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe"C:\Users\Admin\AppData\Local\Temp\2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe"C:\Users\Admin\AppData\Local\Temp\2a0b41e0efa49625a9922bdb25a1525b271d3c72befcb175e3dffa4b7c0afcf7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:992
-
-
C:\Windows\SysWOW64\cofiregdi.exe"C:\Windows\SysWOW64\cofiregdi.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cofiregdi.exe"C:\Windows\SysWOW64\cofiregdi.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1924
-