Analysis
-
max time kernel
169s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 06:10
Static task
static1
Behavioral task
behavioral1
Sample
3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe
Resource
win10v2004-20220414-en
General
-
Target
3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe
-
Size
444KB
-
MD5
bf634e6bd5d768e5b4ad4dd40965ae4e
-
SHA1
5ac1aab29da72cd8b5b65d161bd25dfdcc3b39a0
-
SHA256
3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf
-
SHA512
d3333884c24f43bf522fa6d1089498c34a0cf2d8c90abebaa43b1570d531d21b759edf580fddd24bb921abf8cf2b4637b54a56e968f481e1bdadbba79a0f6bfd
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat accesssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8CCF2B33-683E-4220-94AC-20FAC7255C74}\WpadDecisionTime = a0ab12387088d801 accesssys.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-e1-a2-8e-f2-24\WpadDecision = "0" accesssys.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings accesssys.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 accesssys.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8CCF2B33-683E-4220-94AC-20FAC7255C74}\WpadDecisionReason = "1" accesssys.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8CCF2B33-683E-4220-94AC-20FAC7255C74} accesssys.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8CCF2B33-683E-4220-94AC-20FAC7255C74}\WpadNetworkName = "Network 2" accesssys.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 accesssys.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings accesssys.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections accesssys.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 accesssys.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-e1-a2-8e-f2-24 accesssys.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8CCF2B33-683E-4220-94AC-20FAC7255C74}\fe-e1-a2-8e-f2-24 accesssys.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-e1-a2-8e-f2-24\WpadDecisionReason = "1" accesssys.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-e1-a2-8e-f2-24\WpadDecisionTime = a0ab12387088d801 accesssys.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" accesssys.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad accesssys.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8CCF2B33-683E-4220-94AC-20FAC7255C74}\WpadDecision = "0" accesssys.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1944 3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe 1796 3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe 1528 accesssys.exe 1836 accesssys.exe 1836 accesssys.exe 1836 accesssys.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1796 3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1796 1944 3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe 28 PID 1944 wrote to memory of 1796 1944 3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe 28 PID 1944 wrote to memory of 1796 1944 3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe 28 PID 1944 wrote to memory of 1796 1944 3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe 28 PID 1528 wrote to memory of 1836 1528 accesssys.exe 30 PID 1528 wrote to memory of 1836 1528 accesssys.exe 30 PID 1528 wrote to memory of 1836 1528 accesssys.exe 30 PID 1528 wrote to memory of 1836 1528 accesssys.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe"C:\Users\Admin\AppData\Local\Temp\3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe"C:\Users\Admin\AppData\Local\Temp\3a39346cbb3b0da3659f40e491bd2157a32ccd46099bd1fc3a8b26a71108facf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1796
-
-
C:\Windows\SysWOW64\accesssys.exe"C:\Windows\SysWOW64\accesssys.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\accesssys.exe"C:\Windows\SysWOW64\accesssys.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1836
-