Analysis
-
max time kernel
204s -
max time network
40s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
17-09-2020 15:35
Static task
static1
Behavioral task
behavioral1
Sample
3090bff3d16b0b150444c3bfb196229ba0ab0b6b826fa306803de0192beddb80.ps1
Resource
win7v200722
Behavioral task
behavioral2
Sample
3090bff3d16b0b150444c3bfb196229ba0ab0b6b826fa306803de0192beddb80.ps1
Resource
win10v200722
General
-
Target
3090bff3d16b0b150444c3bfb196229ba0ab0b6b826fa306803de0192beddb80.ps1
-
Size
1.4MB
-
MD5
d87fcd8d2bf450b0056a151e9a116f72
-
SHA1
48cb6bdbe092e5a90c778114b2dda43ce3221c9f
-
SHA256
3090bff3d16b0b150444c3bfb196229ba0ab0b6b826fa306803de0192beddb80
-
SHA512
61a636aca3d224dcd2ed29ca000cf0ecf88f51ffd7cb5182ea4599c9e889cb74b78824d93c7383457bd6d591506202527d44c6a15c93a9ab9cfc8230faddd04b
Malware Config
Signatures
-
SunCrypt Ransomware
Family which threatens to leak data alongside encrypting files. Has claimed to be collaborating with the Maze ransomware group.
-
Blacklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 5 1908 powershell.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
powershell.exedescription ioc process File renamed C:\Users\Admin\Pictures\ExportFind.png => C:\Users\Admin\Pictures\ExportFind.png.BDA78A15C625021C53DCF7488B84CC8CE81E577A6847D1340B9991E90FD6997C powershell.exe File renamed C:\Users\Admin\Pictures\ReadSearch.raw => C:\Users\Admin\Pictures\ReadSearch.raw.483766DDC81B2D23779FB2C183AB74CFC47E4B2F9488836D0E0D5B90FEE8E27E powershell.exe -
Drops startup file 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\YOUR_FILES_ARE_ENCRYPTED.HTML powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
powershell.exedescription ioc process File opened (read-only) \??\Q: powershell.exe File opened (read-only) \??\W: powershell.exe File opened (read-only) \??\Y: powershell.exe File opened (read-only) \??\U: powershell.exe File opened (read-only) \??\P: powershell.exe File opened (read-only) \??\F: powershell.exe File opened (read-only) \??\J: powershell.exe File opened (read-only) \??\L: powershell.exe File opened (read-only) \??\E: powershell.exe File opened (read-only) \??\T: powershell.exe File opened (read-only) \??\S: powershell.exe File opened (read-only) \??\H: powershell.exe File opened (read-only) \??\Z: powershell.exe File opened (read-only) \??\R: powershell.exe File opened (read-only) \??\O: powershell.exe File opened (read-only) \??\K: powershell.exe File opened (read-only) \??\B: powershell.exe File opened (read-only) \??\N: powershell.exe File opened (read-only) \??\I: powershell.exe File opened (read-only) \??\G: powershell.exe File opened (read-only) \??\X: powershell.exe File opened (read-only) \??\V: powershell.exe File opened (read-only) \??\M: powershell.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepid process 836 powershell.exe 836 powershell.exe 1908 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeBackupPrivilege 1332 vssvc.exe Token: SeRestorePrivilege 1332 vssvc.exe Token: SeAuditPrivilege 1332 vssvc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
powershell.execsc.exepowershell.execsc.exedescription pid process target process PID 836 wrote to memory of 1572 836 powershell.exe csc.exe PID 836 wrote to memory of 1572 836 powershell.exe csc.exe PID 836 wrote to memory of 1572 836 powershell.exe csc.exe PID 1572 wrote to memory of 1660 1572 csc.exe cvtres.exe PID 1572 wrote to memory of 1660 1572 csc.exe cvtres.exe PID 1572 wrote to memory of 1660 1572 csc.exe cvtres.exe PID 836 wrote to memory of 1908 836 powershell.exe powershell.exe PID 836 wrote to memory of 1908 836 powershell.exe powershell.exe PID 836 wrote to memory of 1908 836 powershell.exe powershell.exe PID 836 wrote to memory of 1908 836 powershell.exe powershell.exe PID 1908 wrote to memory of 1008 1908 powershell.exe csc.exe PID 1908 wrote to memory of 1008 1908 powershell.exe csc.exe PID 1908 wrote to memory of 1008 1908 powershell.exe csc.exe PID 1908 wrote to memory of 1008 1908 powershell.exe csc.exe PID 1008 wrote to memory of 396 1008 csc.exe cvtres.exe PID 1008 wrote to memory of 396 1008 csc.exe cvtres.exe PID 1008 wrote to memory of 396 1008 csc.exe cvtres.exe PID 1008 wrote to memory of 396 1008 csc.exe cvtres.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3090bff3d16b0b150444c3bfb196229ba0ab0b6b826fa306803de0192beddb80.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4dtjuph3\4dtjuph3.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6F66.tmp" "c:\Users\Admin\AppData\Local\Temp\4dtjuph3\CSC23962D76F81E45C18AAA4A90D0D661D2.TMP"3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file "C:\Users\Admin\AppData\Local\Temp\3090bff3d16b0b150444c3bfb196229ba0ab0b6b826fa306803de0192beddb80.ps1"2⤵
- Blacklisted process makes network request
- Modifies extensions of user files
- Drops startup file
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jxhag211\jxhag211.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES96F2.tmp" "c:\Users\Admin\AppData\Local\Temp\jxhag211\CSC403EF5937FA94C61B7C471C07FB5FE25.TMP"4⤵PID:396
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1332