Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 20:15
Static task
static1
Behavioral task
behavioral1
Sample
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe
Resource
win10v2004-20220812-en
General
-
Target
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe
-
Size
363KB
-
MD5
7ea2c970326af64b1b196c4dd12e61dc
-
SHA1
a3dbdf84d229d3ff549855cf7adc34e75d01efd3
-
SHA256
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
-
SHA512
1128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
SSDEEP
6144:s7I4W+7S5WSSYmPnjpv1WgTO3x5N22vWvLRKKAX5l++SyVI:cBS5VSHFdT85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Wawbmdknpbal.exeWawbmdknpbal.exepid process 1736 Wawbmdknpbal.exe 856 Wawbmdknpbal.exe -
Deletes itself 1 IoCs
Processes:
Wawbmdknpbal.exepid process 1736 Wawbmdknpbal.exe -
Loads dropped DLL 1 IoCs
Processes:
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exepid process 1808 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Wawbmdknpbal.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exeWawbmdknpbal.exedescription pid process target process PID 1808 wrote to memory of 1736 1808 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe Wawbmdknpbal.exe PID 1808 wrote to memory of 1736 1808 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe Wawbmdknpbal.exe PID 1808 wrote to memory of 1736 1808 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe Wawbmdknpbal.exe PID 1808 wrote to memory of 1736 1808 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe Wawbmdknpbal.exe PID 1736 wrote to memory of 856 1736 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 1736 wrote to memory of 856 1736 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 1736 wrote to memory of 856 1736 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 1736 wrote to memory of 856 1736 Wawbmdknpbal.exe Wawbmdknpbal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe"C:\Users\Admin\AppData\Local\Temp\651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w0000011C3⤵
- Executes dropped EXE
PID:856
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1