Analysis
-
max time kernel
196s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe
-
Size
160KB
-
MD5
a4a862ae8115eedc3ca313c5e68ed85c
-
SHA1
1aabc75c61d760b6185f800bd7654b0083f88d03
-
SHA256
5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e
-
SHA512
6e4b57d87b0eb2c3fa3c6c2af5e79d40344730390ea0fbde1ec077cd310e68983fe9b132bf0c64c43d7659f9675da45646b9015df14c637d902ce1376a2144d1
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat powrdroid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 powrdroid.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 powrdroid.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D0511350-1C34-4538-BC7B-FD0BB9A4D0C6}\WpadDecision = "0" powrdroid.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings powrdroid.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad powrdroid.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D0511350-1C34-4538-BC7B-FD0BB9A4D0C6} powrdroid.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D0511350-1C34-4538-BC7B-FD0BB9A4D0C6}\WpadDecisionReason = "1" powrdroid.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-64-39-7c-a4-f5 powrdroid.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 powrdroid.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings powrdroid.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D0511350-1C34-4538-BC7B-FD0BB9A4D0C6}\c6-64-39-7c-a4-f5 powrdroid.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-64-39-7c-a4-f5\WpadDecisionReason = "1" powrdroid.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections powrdroid.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" powrdroid.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D0511350-1C34-4538-BC7B-FD0BB9A4D0C6}\WpadDecisionTime = b0e4640603a5d801 powrdroid.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D0511350-1C34-4538-BC7B-FD0BB9A4D0C6}\WpadNetworkName = "Network 3" powrdroid.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-64-39-7c-a4-f5\WpadDecisionTime = b0e4640603a5d801 powrdroid.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c6-64-39-7c-a4-f5\WpadDecision = "0" powrdroid.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1420 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 980 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 1144 powrdroid.exe 2004 powrdroid.exe 2004 powrdroid.exe 2004 powrdroid.exe 2004 powrdroid.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 980 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1420 wrote to memory of 980 1420 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 27 PID 1420 wrote to memory of 980 1420 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 27 PID 1420 wrote to memory of 980 1420 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 27 PID 1420 wrote to memory of 980 1420 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 27 PID 1144 wrote to memory of 2004 1144 powrdroid.exe 29 PID 1144 wrote to memory of 2004 1144 powrdroid.exe 29 PID 1144 wrote to memory of 2004 1144 powrdroid.exe 29 PID 1144 wrote to memory of 2004 1144 powrdroid.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:980
-
-
C:\Windows\SysWOW64\powrdroid.exe"C:\Windows\SysWOW64\powrdroid.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\powrdroid.exe"C:\Windows\SysWOW64\powrdroid.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2004
-