Overview
overview
10Static
static
10test3/08b0...8c.exe
windows7-x64
10test3/08b0...8c.exe
windows10-2004-x64
10test3/2e8b...6c.exe
windows7-x64
1test3/2e8b...6c.exe
windows10-2004-x64
1test3/5123...72.exe
windows7-x64
1test3/5123...72.exe
windows10-2004-x64
1test3/9208...80.exe
windows7-x64
1test3/9208...80.exe
windows10-2004-x64
1test3/c599...51.exe
windows7-x64
8test3/c599...51.exe
windows10-2004-x64
8test3/d1ee...9b.exe
windows7-x64
5test3/d1ee...9b.exe
windows10-2004-x64
5test3/d3a4...cd.exe
windows7-x64
1test3/d3a4...cd.exe
windows10-2004-x64
1test3/e0c7...46.exe
windows7-x64
10test3/e0c7...46.exe
windows10-2004-x64
10test3/f7ba...d1.exe
windows7-x64
1test3/f7ba...d1.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/01/2023, 07:11
Behavioral task
behavioral1
Sample
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
test3/2e8bcfb94561e536ee0b378b7a879f1fa0763a309f0566c40772652f0b9ee76c.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
test3/2e8bcfb94561e536ee0b378b7a879f1fa0763a309f0566c40772652f0b9ee76c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
test3/51239563ac4a295857c2712133b94de88d49a243329d93f643e6b6c8cc6c0d72.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
test3/51239563ac4a295857c2712133b94de88d49a243329d93f643e6b6c8cc6c0d72.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
test3/9208908b0dc676aa1d9f2db46321bd3da597234fbc33790851032bc4d057b280.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
test3/9208908b0dc676aa1d9f2db46321bd3da597234fbc33790851032bc4d057b280.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
test3/c599af32f470f3853d837af004590fb94bd1b4a595b04dfde22f876f9a8ea851.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
test3/c599af32f470f3853d837af004590fb94bd1b4a595b04dfde22f876f9a8ea851.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
test3/d1eeb2ad38249bd944d2dc659a84f7a394652c537f80b59fceb3a2c284c6919b.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
test3/d1eeb2ad38249bd944d2dc659a84f7a394652c537f80b59fceb3a2c284c6919b.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
test3/d3a43a20d2b6c497160bf63fe0dec0e1edf2e4406c9bd0ed5d00ce663fddc4cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
test3/d3a43a20d2b6c497160bf63fe0dec0e1edf2e4406c9bd0ed5d00ce663fddc4cd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
test3/e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
test3/e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
test3/f7ba9ce7513a164ff2cbc3d41721d557a94e2441f22a97297f3308df6804ecd1.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
test3/f7ba9ce7513a164ff2cbc3d41721d557a94e2441f22a97297f3308df6804ecd1.exe
Resource
win10v2004-20220812-en
General
-
Target
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
-
Size
214KB
-
MD5
736acf3822d3427fd6eb4655effdb265
-
SHA1
1fb8256161d7e296a3e54fc85444f5ee970ef0e3
-
SHA256
08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c
-
SHA512
31bfc3077109f1b05e52bf11b92e5ff82f680164be36e6ead39dfe1679ac4b76003dac7d7d56435b596ce578586e737f2b46e0ff6f54d19dbda29a134b7f1bb0
-
SSDEEP
6144:EQcM8WDqVJY3laxQwNgs/YPNha3EzEZCxgKqApdLg70CTTNLvzySzVFet+H9ikLB:n8WDqVJY3laxQwNgs/YPNha3EzEZCxgn
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat PcplPurchase.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" PcplPurchase.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 PcplPurchase.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-be-b0-c0-8b\WpadDecisionReason = "1" PcplPurchase.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-be-b0-c0-8b\WpadDecisionTime = 009357d6ab21d901 PcplPurchase.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadDecision = "0" PcplPurchase.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings PcplPurchase.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix PcplPurchase.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" PcplPurchase.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" PcplPurchase.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings PcplPurchase.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0092000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 PcplPurchase.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A} PcplPurchase.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-be-b0-c0-8b PcplPurchase.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-17-be-b0-c0-8b\WpadDecision = "0" PcplPurchase.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadNetworkName = "Network 3" PcplPurchase.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\72-17-be-b0-c0-8b PcplPurchase.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections PcplPurchase.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 PcplPurchase.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad PcplPurchase.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadDecisionReason = "1" PcplPurchase.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A60E6E-431F-49A8-ABBE-FCEBF9C8730A}\WpadDecisionTime = 009357d6ab21d901 PcplPurchase.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1992 PcplPurchase.exe 1992 PcplPurchase.exe 1992 PcplPurchase.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1432 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1432 1132 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe 28 PID 1132 wrote to memory of 1432 1132 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe 28 PID 1132 wrote to memory of 1432 1132 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe 28 PID 1132 wrote to memory of 1432 1132 08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe 28 PID 2036 wrote to memory of 1992 2036 PcplPurchase.exe 30 PID 2036 wrote to memory of 1992 2036 PcplPurchase.exe 30 PID 2036 wrote to memory of 1992 2036 PcplPurchase.exe 30 PID 2036 wrote to memory of 1992 2036 PcplPurchase.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"C:\Users\Admin\AppData\Local\Temp\test3\08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe"2⤵
- Suspicious behavior: RenamesItself
PID:1432
-
-
C:\Windows\SysWOW64\PcplPurchase.exeC:\Windows\SysWOW64\PcplPurchase.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\PcplPurchase.exe"C:\Windows\SysWOW64\PcplPurchase.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1992
-