Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 18:18
Static task
static1
Behavioral task
behavioral1
Sample
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe
Resource
win7-20221111-en
General
-
Target
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe
-
Size
118KB
-
MD5
34952df05ea29f84d07acca48a632a70
-
SHA1
38280fe8d98ee0997c279b25ac3fbf718b1509d8
-
SHA256
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8
-
SHA512
91460927840fed03c5e4be0fc5a74009239e289505d6610cc962aef488b92903876dcc14034fd5221608a8e3260eed0bab5cd930c33dce2b1489f14d01a5a325
-
SSDEEP
1536:mHDQNHRoajvvFOQb/bevSVCyBT82KpIqxomwxpbI1DIAOEOMOwKY79MFCvJgZP1X:SFa4QbTDRBT82Kpzk4djGwKkxEPgWrH
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
resizesitka.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat resizesitka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
resizesitka.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings resizesitka.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1E0ED838-B54F-417D-97E8-C81703E8C97B}\WpadDecisionReason = "1" resizesitka.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1E0ED838-B54F-417D-97E8-C81703E8C97B}\26-af-80-f3-f0-62 resizesitka.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-af-80-f3-f0-62\WpadDecisionTime = 602902951634d901 resizesitka.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 resizesitka.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" resizesitka.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" resizesitka.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1E0ED838-B54F-417D-97E8-C81703E8C97B} resizesitka.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-af-80-f3-f0-62\WpadDecisionReason = "1" resizesitka.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 resizesitka.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad resizesitka.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1E0ED838-B54F-417D-97E8-C81703E8C97B}\WpadDecisionTime = 602902951634d901 resizesitka.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1E0ED838-B54F-417D-97E8-C81703E8C97B}\WpadNetworkName = "Network 2" resizesitka.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-af-80-f3-f0-62 resizesitka.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-af-80-f3-f0-62\WpadDecision = "0" resizesitka.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections resizesitka.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix resizesitka.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" resizesitka.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings resizesitka.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f004a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 resizesitka.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1E0ED838-B54F-417D-97E8-C81703E8C97B}\WpadDecision = "0" resizesitka.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
resizesitka.exepid process 1924 resizesitka.exe 1924 resizesitka.exe 1924 resizesitka.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exepid process 1432 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exeresizesitka.exeresizesitka.exepid process 1792 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 1432 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 1116 resizesitka.exe 1924 resizesitka.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exeresizesitka.exedescription pid process target process PID 1792 wrote to memory of 1432 1792 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe PID 1792 wrote to memory of 1432 1792 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe PID 1792 wrote to memory of 1432 1792 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe PID 1792 wrote to memory of 1432 1792 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe 783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe PID 1116 wrote to memory of 1924 1116 resizesitka.exe resizesitka.exe PID 1116 wrote to memory of 1924 1116 resizesitka.exe resizesitka.exe PID 1116 wrote to memory of 1924 1116 resizesitka.exe resizesitka.exe PID 1116 wrote to memory of 1924 1116 resizesitka.exe resizesitka.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe"C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\783b113080fa36887d57234d3421e365a54467baf4d15d3b655212e49b287fd8.exe--7495329f2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1432
-
-
C:\Windows\SysWOW64\resizesitka.exe"C:\Windows\SysWOW64\resizesitka.exe"1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\resizesitka.exe--b3d979162⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1924
-