Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 02:32
Static task
static1
Behavioral task
behavioral1
Sample
336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe
-
Size
160KB
-
MD5
4e13fd1ecd6a94ad4dea73cac694cccf
-
SHA1
2e27c287865911827319f010fd00830f1bb687cc
-
SHA256
336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583
-
SHA512
b132069841259b4569d0ea2a934e5f569327ce2c6dda0805a776d5dd79202290b8133e816a8c0dae5be2cf814e3bbeab7fcc6b30dff660ed57f41adc085ac32f
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat metagenmfidl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 metagenmfidl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-ba-f1-90-c9-ec metagenmfidl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E0035F9-BDF9-4DC5-B840-3B287573FBA6}\WpadDecisionTime = 905ebf345f84d801 metagenmfidl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-ba-f1-90-c9-ec\WpadDecisionTime = 905ebf345f84d801 metagenmfidl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections metagenmfidl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E0035F9-BDF9-4DC5-B840-3B287573FBA6}\WpadDecision = "0" metagenmfidl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E0035F9-BDF9-4DC5-B840-3B287573FBA6}\WpadNetworkName = "Network 3" metagenmfidl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-ba-f1-90-c9-ec\WpadDecisionTime = 103242f55e84d801 metagenmfidl.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-ba-f1-90-c9-ec\WpadDetectedUrl metagenmfidl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E0035F9-BDF9-4DC5-B840-3B287573FBA6} metagenmfidl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 metagenmfidl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings metagenmfidl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E0035F9-BDF9-4DC5-B840-3B287573FBA6}\12-ba-f1-90-c9-ec metagenmfidl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-ba-f1-90-c9-ec\WpadDecisionReason = "1" metagenmfidl.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings metagenmfidl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad metagenmfidl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0069000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 metagenmfidl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E0035F9-BDF9-4DC5-B840-3B287573FBA6}\WpadDecisionReason = "1" metagenmfidl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E0035F9-BDF9-4DC5-B840-3B287573FBA6}\WpadDecisionTime = 103242f55e84d801 metagenmfidl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-ba-f1-90-c9-ec\WpadDecision = "0" metagenmfidl.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0069000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 metagenmfidl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" metagenmfidl.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2024 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 1404 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 992 metagenmfidl.exe 1996 metagenmfidl.exe 1996 metagenmfidl.exe 1996 metagenmfidl.exe 1996 metagenmfidl.exe 1996 metagenmfidl.exe 1996 metagenmfidl.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1404 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1404 2024 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 27 PID 2024 wrote to memory of 1404 2024 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 27 PID 2024 wrote to memory of 1404 2024 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 27 PID 2024 wrote to memory of 1404 2024 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 27 PID 992 wrote to memory of 1996 992 metagenmfidl.exe 29 PID 992 wrote to memory of 1996 992 metagenmfidl.exe 29 PID 992 wrote to memory of 1996 992 metagenmfidl.exe 29 PID 992 wrote to memory of 1996 992 metagenmfidl.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1404
-
-
C:\Windows\SysWOW64\metagenmfidl.exe"C:\Windows\SysWOW64\metagenmfidl.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\metagenmfidl.exe"C:\Windows\SysWOW64\metagenmfidl.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1996
-