Analysis
-
max time kernel
167s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 13:20
Static task
static1
Behavioral task
behavioral1
Sample
3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe
Resource
win7-20221111-en
windows7-x64
8 signatures
150 seconds
General
-
Target
3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe
-
Size
183KB
-
MD5
a0c73bb846506a8d8aad74c2cd0ce50e
-
SHA1
ffafddcf73f45da75d67f772ce24b93fb7e6e5b1
-
SHA256
3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea
-
SHA512
e3680feacbd85982896570eab2bed24bf4bc6111f1d727bba7635a6b89f0b73277f7023246eaffc72f7ff8bc86def9dd1207e0f6bf313e744787d8db2be3bc1f
-
SSDEEP
3072:fLAjPvW7MmCSth5DZ03sOKIzY9l/1AXBNEcqgT2b6B:zO4MmRDy44Uih
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 sortingiell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE sortingiell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies sortingiell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 sortingiell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix sortingiell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" sortingiell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" sortingiell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 208 sortingiell.exe 208 sortingiell.exe 208 sortingiell.exe 208 sortingiell.exe 208 sortingiell.exe 208 sortingiell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 432 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4680 wrote to memory of 432 4680 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 83 PID 4680 wrote to memory of 432 4680 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 83 PID 4680 wrote to memory of 432 4680 3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe 83 PID 1352 wrote to memory of 208 1352 sortingiell.exe 86 PID 1352 wrote to memory of 208 1352 sortingiell.exe 86 PID 1352 wrote to memory of 208 1352 sortingiell.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe"C:\Users\Admin\AppData\Local\Temp\3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3fb189dc99f52402bb2cb1336b35afd2e221e607f60a7b3780528c6543409fea.exe--f73a8fb12⤵
- Suspicious behavior: RenamesItself
PID:432
-
-
C:\Windows\SysWOW64\sortingiell.exe"C:\Windows\SysWOW64\sortingiell.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\sortingiell.exe--3ccc7a962⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:208
-