Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 09:15
Static task
static1
Behavioral task
behavioral1
Sample
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe
-
Size
107KB
-
MD5
2713803ed23c454fa465882d919de3a3
-
SHA1
9e143c0e0fb22c132aec6dffeac137bee7bf8008
-
SHA256
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b
-
SHA512
ed35ef97a281736228e65de3967f95fa00fa8598bd7c77175e93d7f77cc7039afd170f310d8b3108219716349bbe39a54d7ef6f0573a8f6c1999bff51e7eb078
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
mgmtmgmt.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mgmtmgmt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
mgmtmgmt.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mgmtmgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mgmtmgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D24B047A-635D-4893-8715-6CE1BDA2A16F}\WpadDecision = "0" mgmtmgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D24B047A-635D-4893-8715-6CE1BDA2A16F}\32-39-56-89-e1-f7 mgmtmgmt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-39-56-89-e1-f7\WpadDecisionTime = b07b5573e591d801 mgmtmgmt.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mgmtmgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mgmtmgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D24B047A-635D-4893-8715-6CE1BDA2A16F}\WpadDecisionReason = "1" mgmtmgmt.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D24B047A-635D-4893-8715-6CE1BDA2A16F}\WpadNetworkName = "Network 3" mgmtmgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mgmtmgmt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mgmtmgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D24B047A-635D-4893-8715-6CE1BDA2A16F} mgmtmgmt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D24B047A-635D-4893-8715-6CE1BDA2A16F}\WpadDecisionTime = b07b5573e591d801 mgmtmgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-39-56-89-e1-f7 mgmtmgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-39-56-89-e1-f7\WpadDecisionReason = "1" mgmtmgmt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mgmtmgmt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mgmtmgmt.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mgmtmgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mgmtmgmt.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0086000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mgmtmgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-39-56-89-e1-f7\WpadDecision = "0" mgmtmgmt.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
mgmtmgmt.exepid process 2036 mgmtmgmt.exe 2036 mgmtmgmt.exe 2036 mgmtmgmt.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exepid process 1456 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exemgmtmgmt.exedescription pid process target process PID 1528 wrote to memory of 1456 1528 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe PID 1528 wrote to memory of 1456 1528 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe PID 1528 wrote to memory of 1456 1528 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe PID 1528 wrote to memory of 1456 1528 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe PID 948 wrote to memory of 2036 948 mgmtmgmt.exe mgmtmgmt.exe PID 948 wrote to memory of 2036 948 mgmtmgmt.exe mgmtmgmt.exe PID 948 wrote to memory of 2036 948 mgmtmgmt.exe mgmtmgmt.exe PID 948 wrote to memory of 2036 948 mgmtmgmt.exe mgmtmgmt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"2⤵
- Suspicious behavior: RenamesItself
PID:1456
-
-
C:\Windows\SysWOW64\mgmtmgmt.exeC:\Windows\SysWOW64\mgmtmgmt.exe1⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\mgmtmgmt.exe"C:\Windows\SysWOW64\mgmtmgmt.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2036
-