Analysis
-
max time kernel
143s -
max time network
204s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:11
Behavioral task
behavioral1
Sample
766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe
Resource
win7-20220812-en
windows7-x64
8 signatures
150 seconds
General
-
Target
766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe
-
Size
104KB
-
MD5
2d3423339177ee4c7312a227e223468a
-
SHA1
729752ad88a404f4a0eaffd44f9c3001bc1d436e
-
SHA256
766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161
-
SHA512
904b7c08df327deb0bce723d0233ce47c3a455c669dfb6899ee82c3c0b03b13d5e83f9ccd53fdb95cc57d82a0af10531466c961049c2c4da7f22f9890e428ca8
-
SSDEEP
3072:teOu7+iAakCyv7kVJhtjqZeWsjIiq9Yn50VR:cKimD7kVJhMZeNNq9Ynw
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
ipropboxes.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat ipropboxes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
ipropboxes.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ipropboxes.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings ipropboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{008F2908-CE95-4B61-8E93-47EA8C10AE65}\WpadDecisionReason = "1" ipropboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{008F2908-CE95-4B61-8E93-47EA8C10AE65}\WpadDecisionTime = 60e400804006d901 ipropboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{008F2908-CE95-4B61-8E93-47EA8C10AE65}\WpadDecision = "0" ipropboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e2-cf-3a-b1-91 ipropboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ipropboxes.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ipropboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e2-cf-3a-b1-91\WpadDecisionTime = 60e400804006d901 ipropboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e2-cf-3a-b1-91\WpadDecisionReason = "1" ipropboxes.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ipropboxes.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad ipropboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ipropboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{008F2908-CE95-4B61-8E93-47EA8C10AE65} ipropboxes.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{008F2908-CE95-4B61-8E93-47EA8C10AE65}\WpadNetworkName = "Network 3" ipropboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ipropboxes.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ipropboxes.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{008F2908-CE95-4B61-8E93-47EA8C10AE65}\be-e2-cf-3a-b1-91 ipropboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\be-e2-cf-3a-b1-91\WpadDecision = "0" ipropboxes.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" ipropboxes.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0086000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ipropboxes.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ipropboxes.exepid process 1988 ipropboxes.exe 1988 ipropboxes.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exepid process 1908 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exeipropboxes.exeipropboxes.exepid process 1500 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe 1908 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe 1136 ipropboxes.exe 1988 ipropboxes.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exeipropboxes.exedescription pid process target process PID 1500 wrote to memory of 1908 1500 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe PID 1500 wrote to memory of 1908 1500 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe PID 1500 wrote to memory of 1908 1500 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe PID 1500 wrote to memory of 1908 1500 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe 766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe PID 1136 wrote to memory of 1988 1136 ipropboxes.exe ipropboxes.exe PID 1136 wrote to memory of 1988 1136 ipropboxes.exe ipropboxes.exe PID 1136 wrote to memory of 1988 1136 ipropboxes.exe ipropboxes.exe PID 1136 wrote to memory of 1988 1136 ipropboxes.exe ipropboxes.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe"C:\Users\Admin\AppData\Local\Temp\766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\766966e7290e6ec39da0b95478a619a00998669b79758a4cc72a41da5a932161.exe--9db3a9362⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1908
-
-
C:\Windows\SysWOW64\ipropboxes.exe"C:\Windows\SysWOW64\ipropboxes.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\ipropboxes.exe--49bbf5df2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1988
-