Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 17:00
Static task
static1
Behavioral task
behavioral1
Sample
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe
Resource
win10v2004-20220414-en
General
-
Target
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe
-
Size
132KB
-
MD5
61ddf7ff23b1e906bc39754e4eadaf44
-
SHA1
55a4d71f502392f29e734ebf3bac6fec2c91f07e
-
SHA256
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4
-
SHA512
e64d0673b39d19219ecdb8d938d933249df379d6006eb8ae0298e6695cf93106049f75d46adafbf05a3061fa72659743fb59d93021ba4a88e722c928c58e42ac
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
vscsingle.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat vscsingle.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
Processes:
vscsingle.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-41-59-f1-3e-c3\WpadDecisionTime = a048aff2108fd801 vscsingle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings vscsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B0DBDAA4-B0C9-4591-85F5-2DF8CD6D2D7D}\WpadDecisionReason = "1" vscsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f005e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vscsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B0DBDAA4-B0C9-4591-85F5-2DF8CD6D2D7D}\WpadDecisionTime = a048aff2108fd801 vscsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B0DBDAA4-B0C9-4591-85F5-2DF8CD6D2D7D}\WpadDecision = "0" vscsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-41-59-f1-3e-c3 vscsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B0DBDAA4-B0C9-4591-85F5-2DF8CD6D2D7D}\2e-41-59-f1-3e-c3 vscsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-41-59-f1-3e-c3\WpadDecision = "0" vscsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections vscsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vscsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-41-59-f1-3e-c3\WpadDecisionReason = "1" vscsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings vscsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vscsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B0DBDAA4-B0C9-4591-85F5-2DF8CD6D2D7D} vscsingle.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B0DBDAA4-B0C9-4591-85F5-2DF8CD6D2D7D}\WpadNetworkName = "Network 3" vscsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" vscsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad vscsingle.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exevscsingle.exevscsingle.exepid Process 2008 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 940 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 1164 vscsingle.exe 884 vscsingle.exe 884 vscsingle.exe 884 vscsingle.exe 884 vscsingle.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exepid Process 940 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exevscsingle.exedescription pid Process procid_target PID 2008 wrote to memory of 940 2008 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 27 PID 2008 wrote to memory of 940 2008 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 27 PID 2008 wrote to memory of 940 2008 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 27 PID 2008 wrote to memory of 940 2008 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 27 PID 1164 wrote to memory of 884 1164 vscsingle.exe 29 PID 1164 wrote to memory of 884 1164 vscsingle.exe 29 PID 1164 wrote to memory of 884 1164 vscsingle.exe 29 PID 1164 wrote to memory of 884 1164 vscsingle.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:940
-
-
C:\Windows\SysWOW64\vscsingle.exe"C:\Windows\SysWOW64\vscsingle.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\vscsingle.exe"C:\Windows\SysWOW64\vscsingle.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:884
-