Analysis
-
max time kernel
161s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 15:59
Behavioral task
behavioral1
Sample
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe
Resource
win10v2004-20220901-en
General
-
Target
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe
-
Size
398KB
-
MD5
6fc485db03eddbe362f781e0dd3628f7
-
SHA1
1d6d0d9fb16a156292856ee0c12841eda27ec10f
-
SHA256
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3
-
SHA512
ce57c2f975436cb0071a3f98f7f927b60da25dae496695e7b8a32b753aeddf2f05042a76af11dfe8d5225af8be3ff2cca3b8f60503606943582f778db124a32a
-
SSDEEP
6144:uYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UO0BHvbFyA3:uSNC80I+cR3R03VseuOiHvgA3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe chrome.exe" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/3300-132-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3300-139-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\chrome.exe" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\x: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\z: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\p: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\t: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\b: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\e: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\h: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\k: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\l: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\m: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\u: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\y: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\g: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\j: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\n: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\o: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\q: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\r: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\a: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\f: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\i: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\s: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened (read-only) \??\v: d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3300-139-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\d:\autorun.inf d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\autorun.ini d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File created C:\Windows\SysWOW64\chrome.exe d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened for modification C:\Windows\SysWOW64\chrome.exe d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\chrome.exe d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe File opened for modification C:\Windows\chrome.exe d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://h1.ripway.com/poojasharma/index.html" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://h1.ripway.com/poojasharma/index.html" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://h1.ripway.com/poojasharma/index.html" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://h1.ripway.com/poojasharma/index.html" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://h1.ripway.com/poojasharma/index.html" d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3860 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 84 PID 3300 wrote to memory of 3860 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 84 PID 3300 wrote to memory of 3860 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 84 PID 3860 wrote to memory of 3824 3860 cmd.exe 86 PID 3860 wrote to memory of 3824 3860 cmd.exe 86 PID 3860 wrote to memory of 3824 3860 cmd.exe 86 PID 3300 wrote to memory of 3168 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 87 PID 3300 wrote to memory of 3168 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 87 PID 3300 wrote to memory of 3168 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 87 PID 3168 wrote to memory of 4636 3168 cmd.exe 89 PID 3168 wrote to memory of 4636 3168 cmd.exe 89 PID 3168 wrote to memory of 4636 3168 cmd.exe 89 PID 3300 wrote to memory of 3212 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 90 PID 3300 wrote to memory of 3212 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 90 PID 3300 wrote to memory of 3212 3300 d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe 90 PID 3212 wrote to memory of 4092 3212 cmd.exe 92 PID 3212 wrote to memory of 4092 3212 cmd.exe 92 PID 3212 wrote to memory of 4092 3212 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe"C:\Users\Admin\AppData\Local\Temp\d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\chrome.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\chrome.exe3⤵PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f2⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\cacls.execacls "C:\system volume information" /e /g "Admin":f3⤵PID:4092
-
-