Analysis
-
max time kernel
152s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 05:11
Behavioral task
behavioral1
Sample
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe
Resource
win10v2004-20220812-en
General
-
Target
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe
-
Size
139KB
-
MD5
a2ac60fa95b1e2d98252b7e86e4a027e
-
SHA1
1afcb183d78bf94b58f0ed59ebc15ba40b1b58ca
-
SHA256
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f
-
SHA512
8faeb3e7f933df7e4084434636a0861a9c2e8be7f976d39c87653105eb03156797178cc4b859989d26b80bf980fe42187b8f5965fdb1d1429c15f0ad477d5aa3
-
SSDEEP
3072:3CpRq0P0gSlzkMBEHfHa0KmRTrqeD2oWTZoN7VBRcIyOjP0aO:qlPQzK60xWoWSN7Bv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4544-132-0x0000000000400000-0x0000000000484000-memory.dmp aspack_v212_v242 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\wmplayer.exe" 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Download 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4544 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1008 4544 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe 85 PID 4544 wrote to memory of 1008 4544 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe 85 PID 1008 wrote to memory of 1288 1008 msedge.exe 86 PID 1008 wrote to memory of 1288 1008 msedge.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe"C:\Users\Admin\AppData\Local\Temp\974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.youtube.com/watch?v=tkFQS92d6gw2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbec3b46f8,0x7ffbec3b4708,0x7ffbec3b47183⤵PID:1288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4544 -ip 45441⤵PID:5092