Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 09:15
Static task
static1
Behavioral task
behavioral1
Sample
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe
-
Size
107KB
-
MD5
2713803ed23c454fa465882d919de3a3
-
SHA1
9e143c0e0fb22c132aec6dffeac137bee7bf8008
-
SHA256
46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b
-
SHA512
ed35ef97a281736228e65de3967f95fa00fa8598bd7c77175e93d7f77cc7039afd170f310d8b3108219716349bbe39a54d7ef6f0573a8f6c1999bff51e7eb078
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 certapp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE certapp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies certapp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 certapp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix certapp.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" certapp.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" certapp.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 100 certapp.exe 100 certapp.exe 100 certapp.exe 100 certapp.exe 100 certapp.exe 100 certapp.exe 100 certapp.exe 100 certapp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1352 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3316 wrote to memory of 1352 3316 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe 82 PID 3316 wrote to memory of 1352 3316 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe 82 PID 3316 wrote to memory of 1352 3316 46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe 82 PID 232 wrote to memory of 100 232 certapp.exe 86 PID 232 wrote to memory of 100 232 certapp.exe 86 PID 232 wrote to memory of 100 232 certapp.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"C:\Users\Admin\AppData\Local\Temp\46492e74843cad3c1737eb6574a23860f6d06bb6ded87cfa60813f6a2733651b.exe"2⤵
- Suspicious behavior: RenamesItself
PID:1352
-
-
C:\Windows\SysWOW64\certapp.exeC:\Windows\SysWOW64\certapp.exe1⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\certapp.exe"C:\Windows\SysWOW64\certapp.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:100
-