Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe
Resource
win10v2004-20220901-en
General
-
Target
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe
-
Size
360KB
-
MD5
354f7ec15741db7fcdfe7b158c14dfaa
-
SHA1
1265f62cb1bf781baaf5161e8b2fcd40a4026747
-
SHA256
6af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c
-
SHA512
c8425a333a0aa7cb916406b825baaba2e462a81dcfc64b725dceadd81163f8928463603f70e6d5c354dd0ad59e4ed74572bcd780957d947bfa9d97ae89477227
-
SSDEEP
6144:7Y56KnPgfagNgMhdAp/WgTO3x5N22vWvLRKKAX5l++SyVI4H:qdgfpNDAxT85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Wawbmdknpbal.exeWawbmdknpbal.exepid process 5028 Wawbmdknpbal.exe 1280 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Wawbmdknpbal.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exeWawbmdknpbal.exedescription pid process target process PID 1388 wrote to memory of 5028 1388 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe Wawbmdknpbal.exe PID 1388 wrote to memory of 5028 1388 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe Wawbmdknpbal.exe PID 1388 wrote to memory of 5028 1388 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe Wawbmdknpbal.exe PID 5028 wrote to memory of 1280 5028 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 5028 wrote to memory of 1280 5028 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 5028 wrote to memory of 1280 5028 Wawbmdknpbal.exe Wawbmdknpbal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe"C:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629_unpacked.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w0000021C3⤵
- Executes dropped EXE
PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD5354f7ec15741db7fcdfe7b158c14dfaa
SHA11265f62cb1bf781baaf5161e8b2fcd40a4026747
SHA2566af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c
SHA512c8425a333a0aa7cb916406b825baaba2e462a81dcfc64b725dceadd81163f8928463603f70e6d5c354dd0ad59e4ed74572bcd780957d947bfa9d97ae89477227
-
Filesize
360KB
MD5354f7ec15741db7fcdfe7b158c14dfaa
SHA11265f62cb1bf781baaf5161e8b2fcd40a4026747
SHA2566af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c
SHA512c8425a333a0aa7cb916406b825baaba2e462a81dcfc64b725dceadd81163f8928463603f70e6d5c354dd0ad59e4ed74572bcd780957d947bfa9d97ae89477227
-
Filesize
360KB
MD5354f7ec15741db7fcdfe7b158c14dfaa
SHA11265f62cb1bf781baaf5161e8b2fcd40a4026747
SHA2566af16a07d19bcb99eed8b440d7a110ee1bad1dd95eaeda2302c423ab9a5a146c
SHA512c8425a333a0aa7cb916406b825baaba2e462a81dcfc64b725dceadd81163f8928463603f70e6d5c354dd0ad59e4ed74572bcd780957d947bfa9d97ae89477227