Analysis
-
max time kernel
59s -
max time network
6s -
platform
windows7_x64 -
resource
win7 -
submitted
25-06-2020 05:30
Static task
static1
Behavioral task
behavioral1
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win7
Behavioral task
behavioral2
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win10v200430
General
-
Target
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
-
Size
60KB
-
MD5
0ed2ca539a01cdb86c88a9a1604b2005
-
SHA1
4fed7eae00bfa21938e49f33b7c6794fd7d0750c
-
SHA256
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
-
SHA512
34dad101cd7c5f9ff2267674d224986b9274e0e17d9ae665ca1af4ffa57408106238b1e248045465ab17c72a4b92473ab3714aefb705d95f9725a4251379c7e2
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 740 vssvc.exe Token: SeRestorePrivilege 740 vssvc.exe Token: SeAuditPrivilege 740 vssvc.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 1804 takeown.exe 1356 icacls.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
icacls.exetakeown.exepid process 1356 icacls.exe 1804 takeown.exe -
Loads dropped DLL 2 IoCs
Processes:
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exepid process 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exeMpdev:binMpdev.execmd.execmd.execmd.exedescription pid process target process PID 1456 wrote to memory of 1484 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe Mpdev:bin PID 1456 wrote to memory of 1484 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe Mpdev:bin PID 1456 wrote to memory of 1484 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe Mpdev:bin PID 1456 wrote to memory of 1484 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe Mpdev:bin PID 1484 wrote to memory of 284 1484 Mpdev:bin vssadmin.exe PID 1484 wrote to memory of 284 1484 Mpdev:bin vssadmin.exe PID 1484 wrote to memory of 284 1484 Mpdev:bin vssadmin.exe PID 1484 wrote to memory of 284 1484 Mpdev:bin vssadmin.exe PID 1484 wrote to memory of 1804 1484 Mpdev:bin takeown.exe PID 1484 wrote to memory of 1804 1484 Mpdev:bin takeown.exe PID 1484 wrote to memory of 1804 1484 Mpdev:bin takeown.exe PID 1484 wrote to memory of 1804 1484 Mpdev:bin takeown.exe PID 1484 wrote to memory of 1356 1484 Mpdev:bin icacls.exe PID 1484 wrote to memory of 1356 1484 Mpdev:bin icacls.exe PID 1484 wrote to memory of 1356 1484 Mpdev:bin icacls.exe PID 1484 wrote to memory of 1356 1484 Mpdev:bin icacls.exe PID 1760 wrote to memory of 1624 1760 Mpdev.exe cmd.exe PID 1760 wrote to memory of 1624 1760 Mpdev.exe cmd.exe PID 1760 wrote to memory of 1624 1760 Mpdev.exe cmd.exe PID 1760 wrote to memory of 1624 1760 Mpdev.exe cmd.exe PID 1624 wrote to memory of 1532 1624 cmd.exe choice.exe PID 1624 wrote to memory of 1532 1624 cmd.exe choice.exe PID 1624 wrote to memory of 1532 1624 cmd.exe choice.exe PID 1624 wrote to memory of 1532 1624 cmd.exe choice.exe PID 1484 wrote to memory of 1916 1484 Mpdev:bin cmd.exe PID 1484 wrote to memory of 1916 1484 Mpdev:bin cmd.exe PID 1484 wrote to memory of 1916 1484 Mpdev:bin cmd.exe PID 1484 wrote to memory of 1916 1484 Mpdev:bin cmd.exe PID 1456 wrote to memory of 1944 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe cmd.exe PID 1456 wrote to memory of 1944 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe cmd.exe PID 1456 wrote to memory of 1944 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe cmd.exe PID 1456 wrote to memory of 1944 1456 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe cmd.exe PID 1916 wrote to memory of 1972 1916 cmd.exe choice.exe PID 1916 wrote to memory of 1972 1916 cmd.exe choice.exe PID 1916 wrote to memory of 1972 1916 cmd.exe choice.exe PID 1916 wrote to memory of 1972 1916 cmd.exe choice.exe PID 1944 wrote to memory of 1964 1944 cmd.exe choice.exe PID 1944 wrote to memory of 1964 1944 cmd.exe choice.exe PID 1944 wrote to memory of 1964 1944 cmd.exe choice.exe PID 1944 wrote to memory of 1964 1944 cmd.exe choice.exe PID 1624 wrote to memory of 1980 1624 cmd.exe attrib.exe PID 1624 wrote to memory of 1980 1624 cmd.exe attrib.exe PID 1624 wrote to memory of 1980 1624 cmd.exe attrib.exe PID 1624 wrote to memory of 1980 1624 cmd.exe attrib.exe PID 1916 wrote to memory of 2040 1916 cmd.exe attrib.exe PID 1916 wrote to memory of 2040 1916 cmd.exe attrib.exe PID 1916 wrote to memory of 2040 1916 cmd.exe attrib.exe PID 1916 wrote to memory of 2040 1916 cmd.exe attrib.exe PID 1944 wrote to memory of 2004 1944 cmd.exe attrib.exe PID 1944 wrote to memory of 2004 1944 cmd.exe attrib.exe PID 1944 wrote to memory of 2004 1944 cmd.exe attrib.exe PID 1944 wrote to memory of 2004 1944 cmd.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 284 vssadmin.exe -
Drops file in System32 directory 2 IoCs
Processes:
Mpdev:binattrib.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Mpdev.exe Mpdev:bin File opened for modification C:\Windows\SysWOW64\Mpdev.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 1980 attrib.exe 2040 attrib.exe 2004 attrib.exe -
NTFS ADS 1 IoCs
Processes:
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Mpdev:bin bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
Mpdev:binMpdev.exepid process 1484 Mpdev:bin 1760 Mpdev.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1944 cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- NTFS ADS
PID:1456 -
C:\Users\Admin\AppData\Roaming\Mpdev:binC:\Users\Admin\AppData\Roaming\Mpdev:bin -r2⤵
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Executes dropped EXE
PID:1484 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:284
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Mpdev.exe3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1804
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Mpdev.exe /reset3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1356
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Mpdev" & del "C:\Users\Admin\AppData\Roaming\Mpdev"3⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1972
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Mpdev"4⤵
- Views/modifies file attributes
PID:2040
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe" & del "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"2⤵
- Suspicious use of WriteProcessMemory
- Deletes itself
PID:1944 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1964
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"3⤵
- Views/modifies file attributes
PID:2004
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:740
-
C:\Windows\SysWOW64\Mpdev.exeC:\Windows\SysWOW64\Mpdev.exe -s1⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Mpdev.exe" & del "C:\Windows\SysWOW64\Mpdev.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1532
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Mpdev.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1980
-
-