Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 20:15
Static task
static1
Behavioral task
behavioral1
Sample
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe
Resource
win10v2004-20220812-en
General
-
Target
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe
-
Size
363KB
-
MD5
7ea2c970326af64b1b196c4dd12e61dc
-
SHA1
a3dbdf84d229d3ff549855cf7adc34e75d01efd3
-
SHA256
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
-
SHA512
1128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
SSDEEP
6144:s7I4W+7S5WSSYmPnjpv1WgTO3x5N22vWvLRKKAX5l++SyVI:cBS5VSHFdT85I2vCMX5l+Zn
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
Processes:
Wawbmdknpbal.exeWawbmdknpbal.exepid process 4812 Wawbmdknpbal.exe 312 Wawbmdknpbal.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Wawbmdknpbal.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Wawbmdknpbal.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\Wawbmdknpbal.exe" Wawbmdknpbal.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exeWawbmdknpbal.exedescription pid process target process PID 2052 wrote to memory of 4812 2052 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe Wawbmdknpbal.exe PID 2052 wrote to memory of 4812 2052 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe Wawbmdknpbal.exe PID 2052 wrote to memory of 4812 2052 651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe Wawbmdknpbal.exe PID 4812 wrote to memory of 312 4812 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 4812 wrote to memory of 312 4812 Wawbmdknpbal.exe Wawbmdknpbal.exe PID 4812 wrote to memory of 312 4812 Wawbmdknpbal.exe Wawbmdknpbal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe"C:\Users\Admin\AppData\Local\Temp\651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" "/rC:\Users\Admin\AppData\Local\Temp\651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe"C:\Users\Admin\AppData\Roaming\Wawbmdknpbal.exe" /w000002583⤵
- Executes dropped EXE
PID:312
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1
-
Filesize
363KB
MD57ea2c970326af64b1b196c4dd12e61dc
SHA1a3dbdf84d229d3ff549855cf7adc34e75d01efd3
SHA256651f451aaf9a9694884322d91a225294af145006219c346d1a9b50a2d92db6d9
SHA5121128583ed88f9a44b98c8ab6bbb55a75645e89242dae941dae69c659ba66e40bced6364cb4e05eae5a99be10d2742ed34ec714c314332150ede2fc8c62f6dcd1