Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 14:57
Static task
static1
Behavioral task
behavioral1
Sample
4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe
-
Size
166KB
-
MD5
9bb091b65df0dfcb2628ed9c22470ab8
-
SHA1
9d8d6f1a38e2338e7ab638a65d6032041a86fa43
-
SHA256
4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb
-
SHA512
0eabab08493381ac5618c26f2ba9d584b817f421896f78fb01e6955e4c52142abd8fcc6b691eb0345cd91f18ca1911808ed9ecd63238ff26c672ab392c362168
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat radarneutral.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad radarneutral.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4420727A-EFE9-4269-9A40-BDBABAE13548}\WpadDecisionReason = "1" radarneutral.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4420727A-EFE9-4269-9A40-BDBABAE13548}\WpadDecision = "0" radarneutral.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4420727A-EFE9-4269-9A40-BDBABAE13548}\WpadNetworkName = "Network 3" radarneutral.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-40-f3-b5-5c-16 radarneutral.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4420727A-EFE9-4269-9A40-BDBABAE13548}\fa-40-f3-b5-5c-16 radarneutral.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" radarneutral.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 radarneutral.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-40-f3-b5-5c-16\WpadDecisionReason = "1" radarneutral.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-40-f3-b5-5c-16\WpadDecision = "0" radarneutral.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings radarneutral.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4420727A-EFE9-4269-9A40-BDBABAE13548}\WpadDecisionTime = 50e8b5955a9cd801 radarneutral.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 radarneutral.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections radarneutral.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 radarneutral.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-40-f3-b5-5c-16\WpadDecisionTime = 50e8b5955a9cd801 radarneutral.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings radarneutral.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4420727A-EFE9-4269-9A40-BDBABAE13548} radarneutral.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1956 4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe 280 4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe 1256 radarneutral.exe 2008 radarneutral.exe 2008 radarneutral.exe 2008 radarneutral.exe 2008 radarneutral.exe 2008 radarneutral.exe 2008 radarneutral.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 280 4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1956 wrote to memory of 280 1956 4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe 28 PID 1956 wrote to memory of 280 1956 4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe 28 PID 1956 wrote to memory of 280 1956 4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe 28 PID 1956 wrote to memory of 280 1956 4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe 28 PID 1256 wrote to memory of 2008 1256 radarneutral.exe 30 PID 1256 wrote to memory of 2008 1256 radarneutral.exe 30 PID 1256 wrote to memory of 2008 1256 radarneutral.exe 30 PID 1256 wrote to memory of 2008 1256 radarneutral.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe"C:\Users\Admin\AppData\Local\Temp\4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe"C:\Users\Admin\AppData\Local\Temp\4f431be22b49fef245353a3f2ff07b395a6e264751f9a625ae6e98fb6e025ceb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:280
-
-
C:\Windows\SysWOW64\radarneutral.exe"C:\Windows\SysWOW64\radarneutral.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\radarneutral.exe"C:\Windows\SysWOW64\radarneutral.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2008
-