Analysis
-
max time kernel
140s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 13:20
Behavioral task
behavioral1
Sample
19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe
Resource
win7-20221111-en
General
-
Target
19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe
-
Size
107KB
-
MD5
0b3dac3d2c58050280dbe7d624ba9366
-
SHA1
5ff0adac4c74eacb0ffb5cbbbe13bc22d035674f
-
SHA256
19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d
-
SHA512
d3f04977a6aa2a8a2dde522893404c24415e409e4f7ad6aee11c1cfc74ac44c1aa57e6facd9d36f635e8099a168ae1bedfe497f565a3cd8ff1e3d2942dbf497c
-
SSDEEP
3072:s6pqYis+Gyg67r9Lz5rPCUyP9jnOFw5p1X:lpOs+s6f9Ld9cn86
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 177.231.157.189 -
Drops file in System32 directory 4 IoCs
Processes:
tableshotspot.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tableshotspot.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tableshotspot.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tableshotspot.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 tableshotspot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
tableshotspot.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix tableshotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" tableshotspot.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" tableshotspot.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
tableshotspot.exepid process 4264 tableshotspot.exe 4264 tableshotspot.exe 4264 tableshotspot.exe 4264 tableshotspot.exe 4264 tableshotspot.exe 4264 tableshotspot.exe 4264 tableshotspot.exe 4264 tableshotspot.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exepid process 2464 19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exetableshotspot.exedescription pid process target process PID 1408 wrote to memory of 2464 1408 19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe 19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe PID 1408 wrote to memory of 2464 1408 19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe 19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe PID 1408 wrote to memory of 2464 1408 19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe 19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe PID 3752 wrote to memory of 4264 3752 tableshotspot.exe tableshotspot.exe PID 3752 wrote to memory of 4264 3752 tableshotspot.exe tableshotspot.exe PID 3752 wrote to memory of 4264 3752 tableshotspot.exe tableshotspot.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe"C:\Users\Admin\AppData\Local\Temp\19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\19c8558e871aab1d4e38c9e9b077695ec4a2b416e6a56d0628daa8396432f37d.exe--dd92943b2⤵
- Suspicious behavior: RenamesItself
PID:2464
-
-
C:\Windows\SysWOW64\tableshotspot.exe"C:\Windows\SysWOW64\tableshotspot.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\tableshotspot.exe--d81c5ae02⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4264
-