Analysis
-
max time kernel
104s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 21:56
Static task
static1
Behavioral task
behavioral1
Sample
9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe
Resource
win7-20220812-en
General
-
Target
9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe
-
Size
1.0MB
-
MD5
64e799eeae49edd48af13d85f2584010
-
SHA1
e17a098a4ac56d0d304b1d79537243ba554dbbab
-
SHA256
9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f
-
SHA512
2be4cdccaab17648ef4e05a89439724c9f07b5b0ef66c7bea609e482fa7a7d298bb54c28112d1d3ae6c0f7e76e5914c2e26b3fb69f41e56e64ff8046304d2b4e
-
SSDEEP
24576:ilAuBf15xOWT98+KV2wsZvTHhvGuEsmFDvnxk+:duBHxPu+KV2tVHhO7Lv1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000014156-69.dat acprotect -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\crfilterdrv.sys 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe -
Executes dropped EXE 3 IoCs
pid Process 1436 nfregdrv.exe 1200 CashReminder.exe 1608 CashReminder.exe -
resource yara_rule behavioral1/files/0x0007000000014156-69.dat upx -
Deletes itself 1 IoCs
pid Process 1980 explorer.exe -
Loads dropped DLL 12 IoCs
pid Process 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 1436 nfregdrv.exe 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 1200 CashReminder.exe 1200 CashReminder.exe 1608 CashReminder.exe 1608 CashReminder.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat CashReminder.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 996 set thread context of 1980 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 29 -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\CashReminder\nfapi.dll 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File created C:\Program Files (x86)\CashReminder\libeay32.dll 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File created C:\Program Files (x86)\CashReminder\ProtocolFilters.dll 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File created C:\Program Files (x86)\CashReminder\nfregdrv.exe 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File opened for modification C:\Program Files (x86)\CashReminder\crfilterdrv.sys 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File created C:\Program Files (x86)\CashReminder\CashReminder.exe 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File created C:\Program Files (x86)\CashReminder\ssleay32.dll 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File created C:\Program Files (x86)\CashReminder\crfilterdrv.sys 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe File created C:\Program Files (x86)\CashReminder\uninstall.exe 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings CashReminder.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" CashReminder.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 CashReminder.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9AFF5DBE-64DD-46FA-8411-5879DFB059C1}\WpadDecision = "0" CashReminder.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" CashReminder.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" CashReminder.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 CashReminder.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9AFF5DBE-64DD-46FA-8411-5879DFB059C1} CashReminder.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-c8-77-15-12-e1 CashReminder.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9AFF5DBE-64DD-46FA-8411-5879DFB059C1}\WpadNetworkName = "Network 3" CashReminder.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9AFF5DBE-64DD-46FA-8411-5879DFB059C1}\aa-c8-77-15-12-e1 CashReminder.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-c8-77-15-12-e1\WpadDecisionTime = 105e694397d7d801 CashReminder.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 CashReminder.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ CashReminder.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" CashReminder.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" CashReminder.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad CashReminder.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-c8-77-15-12-e1\WpadDecision = "0" CashReminder.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-c8-77-15-12-e1\WpadDecisionReason = "1" CashReminder.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections CashReminder.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings CashReminder.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix CashReminder.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9AFF5DBE-64DD-46FA-8411-5879DFB059C1}\WpadDecisionReason = "1" CashReminder.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9AFF5DBE-64DD-46FA-8411-5879DFB059C1}\WpadDecisionTime = 105e694397d7d801 CashReminder.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 996 wrote to memory of 1436 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 27 PID 996 wrote to memory of 1436 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 27 PID 996 wrote to memory of 1436 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 27 PID 996 wrote to memory of 1436 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 27 PID 996 wrote to memory of 1200 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 28 PID 996 wrote to memory of 1200 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 28 PID 996 wrote to memory of 1200 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 28 PID 996 wrote to memory of 1200 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 28 PID 996 wrote to memory of 1980 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 29 PID 996 wrote to memory of 1980 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 29 PID 996 wrote to memory of 1980 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 29 PID 996 wrote to memory of 1980 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 29 PID 996 wrote to memory of 1980 996 9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe 29 PID 1200 wrote to memory of 1688 1200 CashReminder.exe 30 PID 1200 wrote to memory of 1688 1200 CashReminder.exe 30 PID 1200 wrote to memory of 1688 1200 CashReminder.exe 30 PID 1200 wrote to memory of 1688 1200 CashReminder.exe 30 PID 1688 wrote to memory of 548 1688 cmd.exe 32 PID 1688 wrote to memory of 548 1688 cmd.exe 32 PID 1688 wrote to memory of 548 1688 cmd.exe 32 PID 1688 wrote to memory of 548 1688 cmd.exe 32 PID 548 wrote to memory of 1728 548 net.exe 33 PID 548 wrote to memory of 1728 548 net.exe 33 PID 548 wrote to memory of 1728 548 net.exe 33 PID 548 wrote to memory of 1728 548 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe"C:\Users\Admin\AppData\Local\Temp\9dbb3f87bb117daebaa4ba0a74566d71699462befb36cd3180125845eeb44d9f.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\CashReminder\nfregdrv.exenfregdrv.exe C:\Windows\system32\drivers\crfilterdrv.sys2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436
-
-
C:\Program Files (x86)\CashReminder\CashReminder.exe"C:\Program Files (x86)\CashReminder\CashReminder.exe" /install /SILENT2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net start CashReminder3⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\net.exenet start CashReminder4⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start CashReminder5⤵PID:1728
-
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Deletes itself
PID:1980
-
-
C:\Program Files (x86)\CashReminder\CashReminder.exe"C:\Program Files (x86)\CashReminder\CashReminder.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD542f0b4449ac9b492bb1ba44013426821
SHA19a5f419a362ff7a673f834b9993d0c2e01e24d24
SHA25634f9e9d231ba4b1e073393416bcf01d8bed8e30de3f180e17599f9c89d7ac1cf
SHA512c8598acf4a21f45498a27e392f455833680dccb6bf1532242e323f56e3cde94933a47273ab39269a67e2d6dfb1654313873427f08ce38ec84441e32524a5a6e6
-
Filesize
433KB
MD542f0b4449ac9b492bb1ba44013426821
SHA19a5f419a362ff7a673f834b9993d0c2e01e24d24
SHA25634f9e9d231ba4b1e073393416bcf01d8bed8e30de3f180e17599f9c89d7ac1cf
SHA512c8598acf4a21f45498a27e392f455833680dccb6bf1532242e323f56e3cde94933a47273ab39269a67e2d6dfb1654313873427f08ce38ec84441e32524a5a6e6
-
Filesize
244KB
MD5d68a76ab1ebbbdde37bb12bd68b1639d
SHA15a340fc91691d21670d025c88216999b7a0ee855
SHA256bb1adda3ebe7d8b2863fa04913d2272c7f3b1ce868d9de88edc0730f43815145
SHA512c6391c64f0e97b8134d6aaf133492d698ea85be7aa491da595fcab7e4c1155b3306764fe51f96b731383576a7d425a6612b1bae7a2e34057750a768330137d3f
-
Filesize
116KB
MD5d8305b5c2810e2e135f87bb32d62810e
SHA1e78991c4d920b61f068c27071253ab5e825572bc
SHA256a035dde03f95ad199a74e141089ea94d24abb42f56a9cc14c86c76c6ce6932ec
SHA512c01145ec54a3e2010d777625b65660f4d88a6488de171a97fdfe29b7da15c45aaa88b49a54046d42d199d5685560670ef2ccc6df3c915fda77a02796069123ab
-
Filesize
48KB
MD501b5780505301ada6dc102fb77b2298c
SHA1328c3931a54af2d7adb88ba4c4c18ce1af8d5a72
SHA256aad2d85472448abe8250cf3180c3d0373540f46e8a8e76d8ef2f78db62be0812
SHA512bc5bd91c46f452a76ae0595287622256e8c79e90158171bedf6b68d4439dfefceb06948bd49deb0aeb1344ce89a312bb87b01e2daf3880729fff642951c33947
-
Filesize
433KB
MD542f0b4449ac9b492bb1ba44013426821
SHA19a5f419a362ff7a673f834b9993d0c2e01e24d24
SHA25634f9e9d231ba4b1e073393416bcf01d8bed8e30de3f180e17599f9c89d7ac1cf
SHA512c8598acf4a21f45498a27e392f455833680dccb6bf1532242e323f56e3cde94933a47273ab39269a67e2d6dfb1654313873427f08ce38ec84441e32524a5a6e6
-
Filesize
433KB
MD542f0b4449ac9b492bb1ba44013426821
SHA19a5f419a362ff7a673f834b9993d0c2e01e24d24
SHA25634f9e9d231ba4b1e073393416bcf01d8bed8e30de3f180e17599f9c89d7ac1cf
SHA512c8598acf4a21f45498a27e392f455833680dccb6bf1532242e323f56e3cde94933a47273ab39269a67e2d6dfb1654313873427f08ce38ec84441e32524a5a6e6
-
Filesize
244KB
MD5d68a76ab1ebbbdde37bb12bd68b1639d
SHA15a340fc91691d21670d025c88216999b7a0ee855
SHA256bb1adda3ebe7d8b2863fa04913d2272c7f3b1ce868d9de88edc0730f43815145
SHA512c6391c64f0e97b8134d6aaf133492d698ea85be7aa491da595fcab7e4c1155b3306764fe51f96b731383576a7d425a6612b1bae7a2e34057750a768330137d3f
-
Filesize
244KB
MD5d68a76ab1ebbbdde37bb12bd68b1639d
SHA15a340fc91691d21670d025c88216999b7a0ee855
SHA256bb1adda3ebe7d8b2863fa04913d2272c7f3b1ce868d9de88edc0730f43815145
SHA512c6391c64f0e97b8134d6aaf133492d698ea85be7aa491da595fcab7e4c1155b3306764fe51f96b731383576a7d425a6612b1bae7a2e34057750a768330137d3f
-
Filesize
116KB
MD5d8305b5c2810e2e135f87bb32d62810e
SHA1e78991c4d920b61f068c27071253ab5e825572bc
SHA256a035dde03f95ad199a74e141089ea94d24abb42f56a9cc14c86c76c6ce6932ec
SHA512c01145ec54a3e2010d777625b65660f4d88a6488de171a97fdfe29b7da15c45aaa88b49a54046d42d199d5685560670ef2ccc6df3c915fda77a02796069123ab
-
Filesize
116KB
MD5d8305b5c2810e2e135f87bb32d62810e
SHA1e78991c4d920b61f068c27071253ab5e825572bc
SHA256a035dde03f95ad199a74e141089ea94d24abb42f56a9cc14c86c76c6ce6932ec
SHA512c01145ec54a3e2010d777625b65660f4d88a6488de171a97fdfe29b7da15c45aaa88b49a54046d42d199d5685560670ef2ccc6df3c915fda77a02796069123ab
-
Filesize
116KB
MD5d8305b5c2810e2e135f87bb32d62810e
SHA1e78991c4d920b61f068c27071253ab5e825572bc
SHA256a035dde03f95ad199a74e141089ea94d24abb42f56a9cc14c86c76c6ce6932ec
SHA512c01145ec54a3e2010d777625b65660f4d88a6488de171a97fdfe29b7da15c45aaa88b49a54046d42d199d5685560670ef2ccc6df3c915fda77a02796069123ab
-
Filesize
48KB
MD501b5780505301ada6dc102fb77b2298c
SHA1328c3931a54af2d7adb88ba4c4c18ce1af8d5a72
SHA256aad2d85472448abe8250cf3180c3d0373540f46e8a8e76d8ef2f78db62be0812
SHA512bc5bd91c46f452a76ae0595287622256e8c79e90158171bedf6b68d4439dfefceb06948bd49deb0aeb1344ce89a312bb87b01e2daf3880729fff642951c33947
-
Filesize
48KB
MD501b5780505301ada6dc102fb77b2298c
SHA1328c3931a54af2d7adb88ba4c4c18ce1af8d5a72
SHA256aad2d85472448abe8250cf3180c3d0373540f46e8a8e76d8ef2f78db62be0812
SHA512bc5bd91c46f452a76ae0595287622256e8c79e90158171bedf6b68d4439dfefceb06948bd49deb0aeb1344ce89a312bb87b01e2daf3880729fff642951c33947
-
Filesize
5KB
MD5e5786e8703d651bc8bd4bfecf46d3844
SHA1fee5aa4b325deecbf69ccb6eadd89bd5ae59723f
SHA256d115bce0a787b4f895e700efe943695c8f1087782807d91d831f6015b0f98774
SHA512d14ad43a01db19428cd8ccd2fe101750860933409b5be2eb85a3e400efcd37b1b6425ce84e87a7fe46ecabc7b91c4b450259e624c178b86e194ba7da97957ba3
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f