Analysis
-
max time kernel
109s -
max time network
131s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
26/06/2020, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win7
Behavioral task
behavioral2
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win10v200430
General
-
Target
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
-
Size
1.0MB
-
MD5
572fea5f025df78f2d316216fbeee52e
-
SHA1
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
-
SHA256
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
-
SHA512
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2144 Product:bin 1492 Product.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Product.exe Product:bin File opened for modification C:\Windows\SysWOW64\Product.exe attrib.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3920 takeown.exe 3300 icacls.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3920 takeown.exe 3300 icacls.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1692 attrib.exe 1804 attrib.exe 2292 attrib.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Product:bin 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2144 2112 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 68 PID 2112 wrote to memory of 2144 2112 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 68 PID 2112 wrote to memory of 2144 2112 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 68 PID 2144 wrote to memory of 2644 2144 Product:bin 69 PID 2144 wrote to memory of 2644 2144 Product:bin 69 PID 2144 wrote to memory of 3920 2144 Product:bin 73 PID 2144 wrote to memory of 3920 2144 Product:bin 73 PID 2144 wrote to memory of 3920 2144 Product:bin 73 PID 2144 wrote to memory of 3300 2144 Product:bin 75 PID 2144 wrote to memory of 3300 2144 Product:bin 75 PID 2144 wrote to memory of 3300 2144 Product:bin 75 PID 1492 wrote to memory of 3696 1492 Product.exe 79 PID 1492 wrote to memory of 3696 1492 Product.exe 79 PID 1492 wrote to memory of 3696 1492 Product.exe 79 PID 3696 wrote to memory of 500 3696 cmd.exe 81 PID 3696 wrote to memory of 500 3696 cmd.exe 81 PID 3696 wrote to memory of 500 3696 cmd.exe 81 PID 2144 wrote to memory of 844 2144 Product:bin 82 PID 2144 wrote to memory of 844 2144 Product:bin 82 PID 2144 wrote to memory of 844 2144 Product:bin 82 PID 2112 wrote to memory of 796 2112 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 84 PID 2112 wrote to memory of 796 2112 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 84 PID 2112 wrote to memory of 796 2112 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 84 PID 844 wrote to memory of 800 844 cmd.exe 86 PID 844 wrote to memory of 800 844 cmd.exe 86 PID 844 wrote to memory of 800 844 cmd.exe 86 PID 796 wrote to memory of 4040 796 cmd.exe 87 PID 796 wrote to memory of 4040 796 cmd.exe 87 PID 796 wrote to memory of 4040 796 cmd.exe 87 PID 3696 wrote to memory of 1692 3696 cmd.exe 89 PID 3696 wrote to memory of 1692 3696 cmd.exe 89 PID 3696 wrote to memory of 1692 3696 cmd.exe 89 PID 844 wrote to memory of 1804 844 cmd.exe 90 PID 844 wrote to memory of 1804 844 cmd.exe 90 PID 844 wrote to memory of 1804 844 cmd.exe 90 PID 796 wrote to memory of 2292 796 cmd.exe 91 PID 796 wrote to memory of 2292 796 cmd.exe 91 PID 796 wrote to memory of 2292 796 cmd.exe 91 -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2644 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1008 vssvc.exe Token: SeRestorePrivilege 1008 vssvc.exe Token: SeAuditPrivilege 1008 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\Product:binC:\Users\Admin\AppData\Roaming\Product:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2644
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Product.exe3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:3920
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Product.exe /reset3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:3300
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Product" & del "C:\Users\Admin\AppData\Roaming\Product"3⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:800
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Product"4⤵
- Views/modifies file attributes
PID:1804
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe" & del "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:4040
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"3⤵
- Views/modifies file attributes
PID:2292
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
C:\Windows\SysWOW64\Product.exeC:\Windows\SysWOW64\Product.exe -s1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Product.exe" & del "C:\Windows\SysWOW64\Product.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:500
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Product.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1692
-
-