Analysis
-
max time kernel
157s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2022 23:29
Static task
static1
Behavioral task
behavioral1
Sample
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe
-
Size
120KB
-
MD5
3dd1e36cbafb8039368ccf4e2bbb923d
-
SHA1
c7fdc7d2c17b6afcb59a264bb09e4c214b4a9e83
-
SHA256
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7
-
SHA512
64b4e115d62583ca8fdbc22c0fec392dc84c891698b90467d2f277ec730e45b6772127d71d174485a37740a54b12ccdf682faa1110889fc7cb186cfb4c507f69
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
sharedcosine.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE sharedcosine.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies sharedcosine.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 sharedcosine.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 sharedcosine.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3760 4424 WerFault.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 4192 4140 WerFault.exe sharedcosine.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
sharedcosine.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" sharedcosine.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" sharedcosine.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix sharedcosine.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exesharedcosine.exesharedcosine.exepid process 4424 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 4424 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5052 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5052 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 4140 sharedcosine.exe 4140 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe 5100 sharedcosine.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exepid process 5052 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exesharedcosine.exedescription pid process target process PID 4424 wrote to memory of 5052 4424 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe PID 4424 wrote to memory of 5052 4424 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe PID 4424 wrote to memory of 5052 4424 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe 5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe PID 4140 wrote to memory of 5100 4140 sharedcosine.exe sharedcosine.exe PID 4140 wrote to memory of 5100 4140 sharedcosine.exe sharedcosine.exe PID 4140 wrote to memory of 5100 4140 sharedcosine.exe sharedcosine.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"C:\Users\Admin\AppData\Local\Temp\5089c768ecadbf4e6f355a978ccef30934da7217c821fa7bb304b665c4cb0ef7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 3722⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4424 -ip 44241⤵PID:4652
-
C:\Windows\SysWOW64\sharedcosine.exe"C:\Windows\SysWOW64\sharedcosine.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\sharedcosine.exe"C:\Windows\SysWOW64\sharedcosine.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 4162⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4140 -ip 41401⤵PID:4332