Analysis
-
max time kernel
222s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 16:04
Static task
static1
Behavioral task
behavioral1
Sample
f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe
Resource
win10v2004-20220812-en
General
-
Target
f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe
-
Size
778KB
-
MD5
374f74def24ea6afad4e5f4b15dcd263
-
SHA1
2c8d39345f5fdf44e8ef5e5175a53dace47103bc
-
SHA256
f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1
-
SHA512
c85de578c5904774771b9b6996679ad4c8f6bffd44666f95c5db3cb6ab6403e4949109a939dfdfc3512fd646ca7f77d976116601856a014cc40bba0cb08bf6a1
-
SSDEEP
12288:TgrGvwCz09gu/di1wRgK94/LP5Ib8sfY2Qgtl2cCch0Nl+NF+n4yUEnYPcoPL3dz:p109hdi1wR59RIsLvz2cCcsl+NqHyz
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Wawbmdknpbal.exeWawbmdknpbal.exepid process 520 Wawbmdknpbal.exe 1692 Wawbmdknpbal.exe -
Deletes itself 1 IoCs
Processes:
Wawbmdknpbal.exepid process 520 Wawbmdknpbal.exe -
Loads dropped DLL 2 IoCs
Processes:
f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exepid process 1968 f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe 1968 f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Wawbmdknpbal.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exeWawbmdknpbal.exedescription pid process target process PID 1968 wrote to memory of 520 1968 f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe Wawbmdknpbal.exe PID 1968 wrote to memory of 520 1968 f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe Wawbmdknpbal.exe PID 1968 wrote to memory of 520 1968 f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe Wawbmdknpbal.exe PID 1968 wrote to memory of 520 1968 f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe Wawbmdknpbal.exe PID 520 wrote to memory of 1692 520 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 520 wrote to memory of 1692 520 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 520 wrote to memory of 1692 520 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 520 wrote to memory of 1692 520 Wawbmdknpbal.exe Wawbmdknpbal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe"C:\Users\Admin\AppData\Local\Temp\f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000000CC3⤵
- Executes dropped EXE
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
778KB
MD5374f74def24ea6afad4e5f4b15dcd263
SHA12c8d39345f5fdf44e8ef5e5175a53dace47103bc
SHA256f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1
SHA512c85de578c5904774771b9b6996679ad4c8f6bffd44666f95c5db3cb6ab6403e4949109a939dfdfc3512fd646ca7f77d976116601856a014cc40bba0cb08bf6a1
-
Filesize
778KB
MD5374f74def24ea6afad4e5f4b15dcd263
SHA12c8d39345f5fdf44e8ef5e5175a53dace47103bc
SHA256f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1
SHA512c85de578c5904774771b9b6996679ad4c8f6bffd44666f95c5db3cb6ab6403e4949109a939dfdfc3512fd646ca7f77d976116601856a014cc40bba0cb08bf6a1
-
Filesize
778KB
MD5374f74def24ea6afad4e5f4b15dcd263
SHA12c8d39345f5fdf44e8ef5e5175a53dace47103bc
SHA256f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1
SHA512c85de578c5904774771b9b6996679ad4c8f6bffd44666f95c5db3cb6ab6403e4949109a939dfdfc3512fd646ca7f77d976116601856a014cc40bba0cb08bf6a1
-
Filesize
778KB
MD5374f74def24ea6afad4e5f4b15dcd263
SHA12c8d39345f5fdf44e8ef5e5175a53dace47103bc
SHA256f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1
SHA512c85de578c5904774771b9b6996679ad4c8f6bffd44666f95c5db3cb6ab6403e4949109a939dfdfc3512fd646ca7f77d976116601856a014cc40bba0cb08bf6a1
-
Filesize
778KB
MD5374f74def24ea6afad4e5f4b15dcd263
SHA12c8d39345f5fdf44e8ef5e5175a53dace47103bc
SHA256f2181881d6ab133323dba5fecbf0cc4236f794ed1261406712b13307e98b90a1
SHA512c85de578c5904774771b9b6996679ad4c8f6bffd44666f95c5db3cb6ab6403e4949109a939dfdfc3512fd646ca7f77d976116601856a014cc40bba0cb08bf6a1