Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 05:21
Static task
static1
Behavioral task
behavioral1
Sample
411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe
-
Size
200KB
-
MD5
35a217cc26ef71d7e77df6ecc613a301
-
SHA1
fe741cdb83b427bfd68ea9e96149e6faabbb6d4c
-
SHA256
411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff
-
SHA512
b9e9ac4535bb6f6ab9cab81df835a44355acac6461a2933ba1faa598abe9bbe4a086bd34b3e37ff270c34e5740223d43b0f3d57c95fff56b88da7958f8eb2bc5
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 cardsmspthrd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 cardsmspthrd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE cardsmspthrd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies cardsmspthrd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" cardsmspthrd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" cardsmspthrd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix cardsmspthrd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4776 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe 4776 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe 3080 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe 3080 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe 1156 cardsmspthrd.exe 1156 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe 1576 cardsmspthrd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3080 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3080 4776 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe 80 PID 4776 wrote to memory of 3080 4776 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe 80 PID 4776 wrote to memory of 3080 4776 411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe 80 PID 1156 wrote to memory of 1576 1156 cardsmspthrd.exe 82 PID 1156 wrote to memory of 1576 1156 cardsmspthrd.exe 82 PID 1156 wrote to memory of 1576 1156 cardsmspthrd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe"C:\Users\Admin\AppData\Local\Temp\411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe"C:\Users\Admin\AppData\Local\Temp\411cc0e848e37589d5af9d8245f2c157ca00e0e0e51276aa43b4258612770eff.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3080
-
-
C:\Windows\SysWOW64\cardsmspthrd.exe"C:\Windows\SysWOW64\cardsmspthrd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cardsmspthrd.exe"C:\Windows\SysWOW64\cardsmspthrd.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1576
-