Analysis
-
max time kernel
600s -
max time network
604s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe
Resource
win10v2004-20220812-en
General
-
Target
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe
-
Size
837KB
-
MD5
fec5a0d4dea87955c124f2eaa1f759f5
-
SHA1
ea2e50e16448ac8131391e5322663660ef0a5632
-
SHA256
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
-
SHA512
2d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
SSDEEP
24576:ghZnfY/dbcSq8cluurLKjgHKOKWOGNpBpK:wfYFwt1fKjgHKYdpBp
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Wawbmdknpbal.exeWawbmdknpbal.exepid process 1604 Wawbmdknpbal.exe 1508 Wawbmdknpbal.exe -
Deletes itself 1 IoCs
Processes:
Wawbmdknpbal.exepid process 1604 Wawbmdknpbal.exe -
Loads dropped DLL 2 IoCs
Processes:
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exepid process 1488 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe 1488 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Wawbmdknpbal.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exeWawbmdknpbal.exedescription pid process target process PID 1488 wrote to memory of 1604 1488 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe Wawbmdknpbal.exe PID 1488 wrote to memory of 1604 1488 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe Wawbmdknpbal.exe PID 1488 wrote to memory of 1604 1488 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe Wawbmdknpbal.exe PID 1488 wrote to memory of 1604 1488 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe Wawbmdknpbal.exe PID 1604 wrote to memory of 1508 1604 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 1604 wrote to memory of 1508 1604 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 1604 wrote to memory of 1508 1604 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 1604 wrote to memory of 1508 1604 Wawbmdknpbal.exe Wawbmdknpbal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe"C:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000000C83⤵
- Executes dropped EXE
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9