Analysis

  • max time kernel
    53s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    30/07/2020, 18:22

General

  • Target

    65ea49a50355ef7cca16d13478d48bd59a3e18305ccf9c3c25d174f979bf7b4b.exe

  • Size

    2.1MB

  • MD5

    d483bd9c3dec2b995b9047757962c448

  • SHA1

    4769c4ea12faf9049e04196829f8e9117bf78f8a

  • SHA256

    65ea49a50355ef7cca16d13478d48bd59a3e18305ccf9c3c25d174f979bf7b4b

  • SHA512

    3cba348d7497577a946b98510179a241d42337dd93c69652e7db59e10aee39b77fc85869c5bab7fff81d42eab5c29d724a153af784bf85fbeaef9171b1750ca0

Malware Config

Signatures

  • Modifies service 2 TTPs 5 IoCs
  • Drops startup file 2 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Suspicious use of WriteProcessMemory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65ea49a50355ef7cca16d13478d48bd59a3e18305ccf9c3c25d174f979bf7b4b.exe
    "C:\Users\Admin\AppData\Local\Temp\65ea49a50355ef7cca16d13478d48bd59a3e18305ccf9c3c25d174f979bf7b4b.exe"
    1⤵
    • Drops startup file
    • Modifies extensions of user files
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" get-wmiobject win32_computersystem | "fl model"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1424
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Start-Process C:\ProgramData\cmdkey.bat -Verb runas
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1084
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\cmdkey.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\system32\vssadmin.exe
          vssadmin.exe Delete Shadows /All /Quiet
          4⤵
          • Interacts with shadow copies
          PID:1792
        • C:\Windows\system32\vssadmin.exe
          vssadmin.exe Resize ShadowStorage /For=C: /On=C: /MaxSize=300MB
          4⤵
          • Interacts with shadow copies
          PID:892
    • C:\Windows\system32\cmd.exe
      "cmd" /c time /t
      2⤵
        PID:2028
      • C:\Windows\system32\cmd.exe
        "cmd" /c time /t
        2⤵
          PID:1208
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Modifies service
        • Suspicious use of AdjustPrivilegeToken
        PID:1828

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads