Analysis
-
max time kernel
600s -
max time network
599s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 22:28
Static task
static1
Behavioral task
behavioral1
Sample
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe
Resource
win10v2004-20220812-en
General
-
Target
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe
-
Size
837KB
-
MD5
fec5a0d4dea87955c124f2eaa1f759f5
-
SHA1
ea2e50e16448ac8131391e5322663660ef0a5632
-
SHA256
4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
-
SHA512
2d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
SSDEEP
24576:ghZnfY/dbcSq8cluurLKjgHKOKWOGNpBpK:wfYFwt1fKjgHKYdpBp
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 1072 Wawbmdknpbal.exe 2876 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1072 1084 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe 83 PID 1084 wrote to memory of 1072 1084 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe 83 PID 1084 wrote to memory of 1072 1084 4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe 83 PID 1072 wrote to memory of 2876 1072 Wawbmdknpbal.exe 84 PID 1072 wrote to memory of 2876 1072 Wawbmdknpbal.exe 84 PID 1072 wrote to memory of 2876 1072 Wawbmdknpbal.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe"C:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\4f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000002183⤵
- Executes dropped EXE
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9
-
Filesize
837KB
MD5fec5a0d4dea87955c124f2eaa1f759f5
SHA1ea2e50e16448ac8131391e5322663660ef0a5632
SHA2564f3220da017e7be3e0b168a958134aae6dc96458cb12118e849465e2af752629
SHA5122d52122e66c2239dff9186c3d91c036ba5a3ab3645bcdaba58157c5e2712b0b15131eee44b6760bfb45506f2f7155202c3cca141585c20e1f1333ddba07038b9