Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe
-
Size
129KB
-
MD5
6de4046f30c513f2907cfb8bcecd2eb5
-
SHA1
b382c47dc850dbb314224d29b83c454f42f4fbef
-
SHA256
1cae96dace01ef11ea003250d3cd9f9519821eff90e781fb6d179051ae7060fd
-
SHA512
6b13d1c553cc7d7555ae618c25d752a9315017e79de90cf9abdfc845f7c3dcbdd9d7d2a709da13e9c9fb2dbbd6483870dcbbff42f58e3d3f7545bc77223698d3
-
SSDEEP
3072:nhRpa+zd/EtzAAZ1rMAKlyDjH/B6SVqCgQfBUnPy8L66iiSB:nhbrdEt8ADrZDjH/B6SVqCgQfBUPy8Lu
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b227d6b7.exe explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b227d6b7 = "C:\\Users\\Admin\\AppData\\Roaming\\b227d6b7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*227d6b7 = "C:\\Users\\Admin\\AppData\\Roaming\\b227d6b7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b227d6b = "C:\\b227d6b7\\b227d6b7.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*227d6b = "C:\\b227d6b7\\b227d6b7.exe" explorer.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ip-addr.es 14 ip-addr.es 130 ip-addr.es -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exeexplorer.exepid process 2580 2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe 1192 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exeexplorer.exedescription pid process target process PID 2580 wrote to memory of 1192 2580 2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe explorer.exe PID 2580 wrote to memory of 1192 2580 2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe explorer.exe PID 2580 wrote to memory of 1192 2580 2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe explorer.exe PID 1192 wrote to memory of 2340 1192 explorer.exe svchost.exe PID 1192 wrote to memory of 2340 1192 explorer.exe svchost.exe PID 1192 wrote to memory of 2340 1192 explorer.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_6de4046f30c513f2907cfb8bcecd2eb5_cryptowall.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\svchost.exe-k netsvcs3⤵PID:2340