Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe
Resource
win7-20220715-en
windows7-x64
7 signatures
150 seconds
General
-
Target
4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe
-
Size
211KB
-
MD5
35e92fe30af505779b26a7b877eb0f70
-
SHA1
9936ba4740f138abb49f07d282ee18b5997ba648
-
SHA256
4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf
-
SHA512
a8342cf4bd5f7b1bcc72687df083017672c0421f45d2973f48bafa03f7a07a19e6aef07777b93d41b27f59b738ae12126d0a351b07b8b82ad6bd5d2eb48a5ef9
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
subsdasmrc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat subsdasmrc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 22 IoCs
Processes:
subsdasmrc.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 subsdasmrc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D4F5937-6EBE-4004-9DD3-83EEFEAAECAB} subsdasmrc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-9c-5c-dd-28-af subsdasmrc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-9c-5c-dd-28-af\WpadDecisionTime = 503b1f368a9cd801 subsdasmrc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections subsdasmrc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 subsdasmrc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-9c-5c-dd-28-af\WpadDecision = "0" subsdasmrc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 subsdasmrc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D4F5937-6EBE-4004-9DD3-83EEFEAAECAB}\WpadDecisionTime = b030b9738a9cd801 subsdasmrc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-9c-5c-dd-28-af\WpadDecisionTime = b030b9738a9cd801 subsdasmrc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D4F5937-6EBE-4004-9DD3-83EEFEAAECAB}\WpadNetworkName = "Network 3" subsdasmrc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-9c-5c-dd-28-af\WpadDecisionReason = "1" subsdasmrc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D4F5937-6EBE-4004-9DD3-83EEFEAAECAB}\WpadDecision = "0" subsdasmrc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 subsdasmrc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D4F5937-6EBE-4004-9DD3-83EEFEAAECAB}\WpadDecisionReason = "1" subsdasmrc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" subsdasmrc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad subsdasmrc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D4F5937-6EBE-4004-9DD3-83EEFEAAECAB}\WpadDecisionTime = 503b1f368a9cd801 subsdasmrc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D4F5937-6EBE-4004-9DD3-83EEFEAAECAB}\36-9c-5c-dd-28-af subsdasmrc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-9c-5c-dd-28-af\WpadDetectedUrl subsdasmrc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings subsdasmrc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings subsdasmrc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exesubsdasmrc.exesubsdasmrc.exepid process 860 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe 2032 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe 1508 subsdasmrc.exe 1724 subsdasmrc.exe 1724 subsdasmrc.exe 1724 subsdasmrc.exe 1724 subsdasmrc.exe 1724 subsdasmrc.exe 1724 subsdasmrc.exe 1724 subsdasmrc.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exepid process 2032 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exesubsdasmrc.exedescription pid process target process PID 860 wrote to memory of 2032 860 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe PID 860 wrote to memory of 2032 860 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe PID 860 wrote to memory of 2032 860 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe PID 860 wrote to memory of 2032 860 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe 4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe PID 1508 wrote to memory of 1724 1508 subsdasmrc.exe subsdasmrc.exe PID 1508 wrote to memory of 1724 1508 subsdasmrc.exe subsdasmrc.exe PID 1508 wrote to memory of 1724 1508 subsdasmrc.exe subsdasmrc.exe PID 1508 wrote to memory of 1724 1508 subsdasmrc.exe subsdasmrc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe"C:\Users\Admin\AppData\Local\Temp\4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe"C:\Users\Admin\AppData\Local\Temp\4dd92acabaf20c9749713447692a0f91dc672b960cb7e2fcdc6e018960d90caf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2032
-
C:\Windows\SysWOW64\subsdasmrc.exe"C:\Windows\SysWOW64\subsdasmrc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\subsdasmrc.exe"C:\Windows\SysWOW64\subsdasmrc.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1724