Analysis
-
max time kernel
151s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:20
Static task
static1
Behavioral task
behavioral1
Sample
3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe
Resource
win7-20221111-en
windows7-x64
8 signatures
150 seconds
General
-
Target
3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe
-
Size
183KB
-
MD5
a0c73bb846506a8d8aad74c2cd0ce50e
-
SHA1
ffafddcf73f45da75d67f772ce24b93fb7e6e5b1
-
SHA256
3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea
-
SHA512
e3680feacbd85982896570eab2bed24bf4bc6111f1d727bba7635a6b89f0b73277f7023246eaffc72f7ff8bc86def9dd1207e0f6bf313e744787d8db2be3bc1f
-
SSDEEP
3072:fLAjPvW7MmCSth5DZ03sOKIzY9l/1AXBNEcqgT2b6B:zO4MmRDy44Uih
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat flowtitle.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" flowtitle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 flowtitle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad flowtitle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-b2-4e-f8-fd-b7\WpadDecisionReason = "1" flowtitle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix flowtitle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings flowtitle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-b2-4e-f8-fd-b7\WpadDecisionTime = a0e4769a4706d901 flowtitle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-b2-4e-f8-fd-b7\WpadDecision = "0" flowtitle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections flowtitle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3DE30DE9-0243-43BF-85D2-E46B40C5D4C7}\WpadNetworkName = "Network 2" flowtitle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3DE30DE9-0243-43BF-85D2-E46B40C5D4C7}\WpadDecisionReason = "1" flowtitle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3DE30DE9-0243-43BF-85D2-E46B40C5D4C7}\f6-b2-4e-f8-fd-b7 flowtitle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" flowtitle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3DE30DE9-0243-43BF-85D2-E46B40C5D4C7} flowtitle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" flowtitle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f003b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 flowtitle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3DE30DE9-0243-43BF-85D2-E46B40C5D4C7}\WpadDecisionTime = a0e4769a4706d901 flowtitle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3DE30DE9-0243-43BF-85D2-E46B40C5D4C7}\WpadDecision = "0" flowtitle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-b2-4e-f8-fd-b7 flowtitle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings flowtitle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 flowtitle.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 520 flowtitle.exe 520 flowtitle.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 832 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1772 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 832 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 436 flowtitle.exe 520 flowtitle.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1772 wrote to memory of 832 1772 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 28 PID 1772 wrote to memory of 832 1772 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 28 PID 1772 wrote to memory of 832 1772 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 28 PID 1772 wrote to memory of 832 1772 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 28 PID 436 wrote to memory of 520 436 flowtitle.exe 30 PID 436 wrote to memory of 520 436 flowtitle.exe 30 PID 436 wrote to memory of 520 436 flowtitle.exe 30 PID 436 wrote to memory of 520 436 flowtitle.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe"C:\Users\Admin\AppData\Local\Temp\3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe--f73a8fb12⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:832
-
-
C:\Windows\SysWOW64\flowtitle.exe"C:\Windows\SysWOW64\flowtitle.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\flowtitle.exe--59e917202⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:520
-