Analysis
-
max time kernel
169s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
18-07-2022 23:29
Static task
static1
Behavioral task
behavioral1
Sample
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe
-
Size
120KB
-
MD5
3dd1e36cbafb8039368ccf4e2bbb923d
-
SHA1
c7fdc7d2c17b6afcb59a264bb09e4c214b4a9e83
-
SHA256
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7
-
SHA512
64b4e115d62583ca8fdbc22c0fec392dc84c891698b90467d2f277ec730e45b6772127d71d174485a37740a54b12ccdf682faa1110889fc7cb186cfb4c507f69
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
crashsquare.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat crashsquare.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
crashsquare.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 crashsquare.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C112EFA5-63F1-43EE-A79A-2022C3D11AD5}\WpadDecisionReason = "1" crashsquare.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C112EFA5-63F1-43EE-A79A-2022C3D11AD5}\WpadDecisionTime = 70f957bc1b9bd801 crashsquare.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-84-54-89-97-15\WpadDecisionReason = "1" crashsquare.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 crashsquare.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix crashsquare.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" crashsquare.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" crashsquare.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad crashsquare.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C112EFA5-63F1-43EE-A79A-2022C3D11AD5}\96-84-54-89-97-15 crashsquare.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-84-54-89-97-15\WpadDecision = "0" crashsquare.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings crashsquare.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections crashsquare.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" crashsquare.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00be000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 crashsquare.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C112EFA5-63F1-43EE-A79A-2022C3D11AD5}\WpadDecision = "0" crashsquare.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C112EFA5-63F1-43EE-A79A-2022C3D11AD5}\WpadNetworkName = "Network 3" crashsquare.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-84-54-89-97-15 crashsquare.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-84-54-89-97-15\WpadDecisionTime = 70f957bc1b9bd801 crashsquare.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings crashsquare.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C112EFA5-63F1-43EE-A79A-2022C3D11AD5} crashsquare.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.execrashsquare.execrashsquare.exepid process 1532 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 1392 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 956 crashsquare.exe 1036 crashsquare.exe 1036 crashsquare.exe 1036 crashsquare.exe 1036 crashsquare.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exepid process 1392 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.execrashsquare.exedescription pid process target process PID 1532 wrote to memory of 1392 1532 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe PID 1532 wrote to memory of 1392 1532 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe PID 1532 wrote to memory of 1392 1532 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe PID 1532 wrote to memory of 1392 1532 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe PID 956 wrote to memory of 1036 956 crashsquare.exe crashsquare.exe PID 956 wrote to memory of 1036 956 crashsquare.exe crashsquare.exe PID 956 wrote to memory of 1036 956 crashsquare.exe crashsquare.exe PID 956 wrote to memory of 1036 956 crashsquare.exe crashsquare.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1392
-
-
C:\Windows\SysWOW64\crashsquare.exe"C:\Windows\SysWOW64\crashsquare.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\crashsquare.exe"C:\Windows\SysWOW64\crashsquare.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1036
-