Analysis
-
max time kernel
184s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 16:49
Static task
static1
Behavioral task
behavioral1
Sample
931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe
Resource
win10v2004-20221111-en
General
-
Target
931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe
-
Size
733KB
-
MD5
31a09770fea2d2ad58709b9a2f0e78c1
-
SHA1
52236081902e7b6de16baf141ffb518a6cba4691
-
SHA256
931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95
-
SHA512
3972210025332a87df980513a3223abfd354be22be149bdaef7294b2a6d0ac2cf144120074cbb5b78ab393f0201026ec90fb46ba3b2b7f141738920d66a387de
-
SSDEEP
12288:0wThSCGHciZYJgDCVcEBQFpC5udlV3kbxZyNccd6/:06hQHnKxBEpC56V0b3yev
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Wawbmdknpbal.exeWawbmdknpbal.exepid process 4904 Wawbmdknpbal.exe 216 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Wawbmdknpbal.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exeWawbmdknpbal.exedescription pid process target process PID 816 wrote to memory of 4904 816 931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe Wawbmdknpbal.exe PID 816 wrote to memory of 4904 816 931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe Wawbmdknpbal.exe PID 816 wrote to memory of 4904 816 931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe Wawbmdknpbal.exe PID 4904 wrote to memory of 216 4904 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 4904 wrote to memory of 216 4904 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 4904 wrote to memory of 216 4904 Wawbmdknpbal.exe Wawbmdknpbal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe"C:\Users\Admin\AppData\Local\Temp\931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w0000024C3⤵
- Executes dropped EXE
PID:216
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
733KB
MD531a09770fea2d2ad58709b9a2f0e78c1
SHA152236081902e7b6de16baf141ffb518a6cba4691
SHA256931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95
SHA5123972210025332a87df980513a3223abfd354be22be149bdaef7294b2a6d0ac2cf144120074cbb5b78ab393f0201026ec90fb46ba3b2b7f141738920d66a387de
-
Filesize
733KB
MD531a09770fea2d2ad58709b9a2f0e78c1
SHA152236081902e7b6de16baf141ffb518a6cba4691
SHA256931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95
SHA5123972210025332a87df980513a3223abfd354be22be149bdaef7294b2a6d0ac2cf144120074cbb5b78ab393f0201026ec90fb46ba3b2b7f141738920d66a387de
-
Filesize
733KB
MD531a09770fea2d2ad58709b9a2f0e78c1
SHA152236081902e7b6de16baf141ffb518a6cba4691
SHA256931708bffa6eed76585c166a080ea6b544f32951cb5dbc2d2065088ee9ebad95
SHA5123972210025332a87df980513a3223abfd354be22be149bdaef7294b2a6d0ac2cf144120074cbb5b78ab393f0201026ec90fb46ba3b2b7f141738920d66a387de