Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 17:25
Static task
static1
Behavioral task
behavioral1
Sample
c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe
-
Size
132KB
-
MD5
3b9b969e59a65fcc1844c2860c8d9cda
-
SHA1
6cc639ce11936daa8cfd6038c21d5a1eaada2abc
-
SHA256
c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f
-
SHA512
c8a84028a3238cc3b37a4ce5bc499837fd283587537a90aa64d3e14ea5782b74eec251569d37ea1e614122eebfa60988fba72816f914030b6d8a6a2c92383a69
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat plainknown.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings plainknown.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad plainknown.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{91B91427-278C-456F-90B8-31FE4C81EBD2} plainknown.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{91B91427-278C-456F-90B8-31FE4C81EBD2}\WpadDecision = "0" plainknown.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-31-93-ef-c4-8f\WpadDecisionReason = "1" plainknown.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections plainknown.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 plainknown.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings plainknown.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00bc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 plainknown.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{91B91427-278C-456F-90B8-31FE4C81EBD2}\WpadDecisionReason = "1" plainknown.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{91B91427-278C-456F-90B8-31FE4C81EBD2}\WpadNetworkName = "Network 3" plainknown.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-31-93-ef-c4-8f plainknown.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-31-93-ef-c4-8f\WpadDecisionTime = 305bf337939fd801 plainknown.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-31-93-ef-c4-8f\WpadDecision = "0" plainknown.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" plainknown.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 plainknown.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{91B91427-278C-456F-90B8-31FE4C81EBD2}\WpadDecisionTime = 305bf337939fd801 plainknown.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{91B91427-278C-456F-90B8-31FE4C81EBD2}\52-31-93-ef-c4-8f plainknown.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 944 c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe 976 c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe 1240 plainknown.exe 2008 plainknown.exe 2008 plainknown.exe 2008 plainknown.exe 2008 plainknown.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 976 c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 944 wrote to memory of 976 944 c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe 27 PID 944 wrote to memory of 976 944 c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe 27 PID 944 wrote to memory of 976 944 c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe 27 PID 944 wrote to memory of 976 944 c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe 27 PID 1240 wrote to memory of 2008 1240 plainknown.exe 29 PID 1240 wrote to memory of 2008 1240 plainknown.exe 29 PID 1240 wrote to memory of 2008 1240 plainknown.exe 29 PID 1240 wrote to memory of 2008 1240 plainknown.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe"C:\Users\Admin\AppData\Local\Temp\c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe"C:\Users\Admin\AppData\Local\Temp\c22b1dd5348d6fe4afd2c96f07846b5f02a2b3baca520fd4c8da641f2774217f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:976
-
-
C:\Windows\SysWOW64\plainknown.exe"C:\Windows\SysWOW64\plainknown.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\plainknown.exe"C:\Windows\SysWOW64\plainknown.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2008
-