Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 18:53
Static task
static1
Behavioral task
behavioral1
Sample
e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe
Resource
win7-20220901-en
General
-
Target
e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe
-
Size
108KB
-
MD5
98daa70ab692915a467779877727cf39
-
SHA1
dafb5dfb3eac517c342958404f99852e670b0fca
-
SHA256
e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f
-
SHA512
4bdc419df084ffa1366c05a14610f5ca210c0d42feb0e8318012bb263cf23202c10075258e8217ff3da1452942016651d2ca0df6d7e53df7d25fa78d13bd9e9b
-
SSDEEP
3072:W4x9Pri16G04TQhl7Z2382rlkTUbzsasOk8ljrxeFFEK4:W4XO1F01hlA8YlJAa5k8ljtL
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
diffenable.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat diffenable.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
diffenable.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{17D5C449-538A-4215-A907-44912CD21314}\WpadNetworkName = "Network 2" diffenable.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-17-aa-63-f9-ce diffenable.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-17-aa-63-f9-ce\WpadDecisionTime = 80a214e97b06d901 diffenable.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" diffenable.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 diffenable.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{17D5C449-538A-4215-A907-44912CD21314}\WpadDecisionReason = "1" diffenable.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{17D5C449-538A-4215-A907-44912CD21314}\WpadDecisionTime = 80a214e97b06d901 diffenable.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{17D5C449-538A-4215-A907-44912CD21314}\WpadDecision = "0" diffenable.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections diffenable.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" diffenable.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings diffenable.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{17D5C449-538A-4215-A907-44912CD21314} diffenable.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{17D5C449-538A-4215-A907-44912CD21314}\a6-17-aa-63-f9-ce diffenable.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings diffenable.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" diffenable.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 diffenable.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad diffenable.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0016000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 diffenable.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-17-aa-63-f9-ce\WpadDecisionReason = "1" diffenable.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-17-aa-63-f9-ce\WpadDecision = "0" diffenable.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix diffenable.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
diffenable.exepid process 1268 diffenable.exe 1268 diffenable.exe 1268 diffenable.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exepid process 1332 e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exee845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exediffenable.exediffenable.exepid process 1760 e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe 1332 e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe 1236 diffenable.exe 1268 diffenable.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exediffenable.exedescription pid process target process PID 1760 wrote to memory of 1332 1760 e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe PID 1760 wrote to memory of 1332 1760 e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe PID 1760 wrote to memory of 1332 1760 e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe PID 1760 wrote to memory of 1332 1760 e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe PID 1236 wrote to memory of 1268 1236 diffenable.exe diffenable.exe PID 1236 wrote to memory of 1268 1236 diffenable.exe diffenable.exe PID 1236 wrote to memory of 1268 1236 diffenable.exe diffenable.exe PID 1236 wrote to memory of 1268 1236 diffenable.exe diffenable.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe"C:\Users\Admin\AppData\Local\Temp\e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e845e5c7d95b80e85fe3c3c1875ca165b2f033221b4255b313c40d4ff82d832f.exe--a9ad73a82⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\diffenable.exe"C:\Windows\SysWOW64\diffenable.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\diffenable.exe--14f42e9a2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1268-60-0x0000000000000000-mapping.dmp
-
memory/1268-62-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1332-55-0x0000000000000000-mapping.dmp
-
memory/1332-58-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1332-59-0x0000000075931000-0x0000000075933000-memory.dmpFilesize
8KB
-
memory/1332-61-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1760-54-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/1760-57-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1760-56-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB