Analysis
-
max time kernel
89s -
max time network
90s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-10-2020 14:04
Static task
static1
Behavioral task
behavioral1
Sample
0AACF2C41BA9B872A52055FFCAEAEF15.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0AACF2C41BA9B872A52055FFCAEAEF15.dll
Resource
win10v20201028
General
-
Target
0AACF2C41BA9B872A52055FFCAEAEF15.dll
-
Size
77KB
-
MD5
0aacf2c41ba9b872a52055ffcaeaef15
-
SHA1
c09b509699aeef71f3e205d53c5f4ff71cb48570
-
SHA256
31630d16f4564c7a214a206a58f60b7623cd1b3abb823d10ed50aa077ca33585
-
SHA512
d259de51d22d72d27d5947530317661b97ba8fcc36e7a2ad4835e98bc311ef1aa5964f939660733171934f6aefa82d8b76a6f9f04137e1aeca63d592f0fb26ec
Malware Config
Extracted
C:\Users\Admin\Desktop\RecoveryManual.html
mountlocker
http://qiludmxlqqotacf62iycexcohbka4ezresf5jmwdoh7iyk3tgguzaaqd.onion/?cid=d11ebd6225c2dd096733ff8dad28b64321dc827ac5a37515abe00375993d6d3b
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
regsvr32.exedescription ioc process File opened for modification \??\c:\Users\Admin\Pictures\UnprotectPush.crw.ReadManual.64BD3273 regsvr32.exe File opened for modification \??\c:\Users\Admin\Pictures\GrantSave.png.ReadManual.64BD3273 regsvr32.exe File opened for modification \??\c:\Users\Admin\Pictures\JoinEdit.png.ReadManual.64BD3273 regsvr32.exe File renamed C:\Users\Admin\Pictures\GrantSave.png => \??\c:\Users\Admin\Pictures\GrantSave.png.ReadManual.64BD3273 regsvr32.exe File renamed C:\Users\Admin\Pictures\JoinEdit.png => \??\c:\Users\Admin\Pictures\JoinEdit.png.ReadManual.64BD3273 regsvr32.exe File renamed C:\Users\Admin\Pictures\TestUnprotect.png => \??\c:\Users\Admin\Pictures\TestUnprotect.png.ReadManual.64BD3273 regsvr32.exe File opened for modification \??\c:\Users\Admin\Pictures\TestUnprotect.png.ReadManual.64BD3273 regsvr32.exe File renamed C:\Users\Admin\Pictures\UnprotectPush.crw => \??\c:\Users\Admin\Pictures\UnprotectPush.crw.ReadManual.64BD3273 regsvr32.exe File renamed C:\Users\Admin\Pictures\ClearRename.tif => \??\c:\Users\Admin\Pictures\ClearRename.tif.ReadManual.64BD3273 regsvr32.exe File opened for modification \??\c:\Users\Admin\Pictures\ClearRename.tif.ReadManual.64BD3273 regsvr32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1388 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 4 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1356 vssadmin.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E8A6631-19EF-11EB-9B42-F2DC1BF59C8B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "310745095" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a60000000000200000000001066000000010000200000001ac62e0a51453159c0b044c8ad555ebac984785dcebd6807bfe3429d0cdeb9ce000000000e80000000020000200000008e8ee3f4b9d4f3b2633841bb88d67ebc9bd262c6ac50885d483d5b798c987ed52000000061071c147b10e2c07300f844b8e190a372c0de2cc7ec1f62b6fc4c4987487a9c400000007d91664cfe2479d268463f636286c91200c2d51b49f10da34c09b6fe475efcae33dfa124bea9aed04f17b3b1e522285b58d4dbc520df3ef0d967f3a15a04cd7d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900a0a24fcadd601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Modifies registry class 5 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.64BD3273\shell\Open\command regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.64BD3273 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.64BD3273\shell regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.64BD3273\shell\Open regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\.64BD3273\shell\Open\command\ = "explorer.exe RecoveryManual.html" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 1984 regsvr32.exe 1984 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
regsvr32.exevssvc.exedescription pid process Token: SeDebugPrivilege 1984 regsvr32.exe Token: SeBackupPrivilege 572 vssvc.exe Token: SeRestorePrivilege 572 vssvc.exe Token: SeAuditPrivilege 572 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1056 iexplore.exe 1056 iexplore.exe 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
regsvr32.exeregsvr32.execmd.exeiexplore.exedescription pid process target process PID 1588 wrote to memory of 1984 1588 regsvr32.exe regsvr32.exe PID 1588 wrote to memory of 1984 1588 regsvr32.exe regsvr32.exe PID 1588 wrote to memory of 1984 1588 regsvr32.exe regsvr32.exe PID 1588 wrote to memory of 1984 1588 regsvr32.exe regsvr32.exe PID 1588 wrote to memory of 1984 1588 regsvr32.exe regsvr32.exe PID 1588 wrote to memory of 1984 1588 regsvr32.exe regsvr32.exe PID 1588 wrote to memory of 1984 1588 regsvr32.exe regsvr32.exe PID 1984 wrote to memory of 1356 1984 regsvr32.exe vssadmin.exe PID 1984 wrote to memory of 1356 1984 regsvr32.exe vssadmin.exe PID 1984 wrote to memory of 1356 1984 regsvr32.exe vssadmin.exe PID 1984 wrote to memory of 1356 1984 regsvr32.exe vssadmin.exe PID 1984 wrote to memory of 1388 1984 regsvr32.exe cmd.exe PID 1984 wrote to memory of 1388 1984 regsvr32.exe cmd.exe PID 1984 wrote to memory of 1388 1984 regsvr32.exe cmd.exe PID 1984 wrote to memory of 1388 1984 regsvr32.exe cmd.exe PID 1388 wrote to memory of 1596 1388 cmd.exe attrib.exe PID 1388 wrote to memory of 1596 1388 cmd.exe attrib.exe PID 1388 wrote to memory of 1596 1388 cmd.exe attrib.exe PID 1388 wrote to memory of 1596 1388 cmd.exe attrib.exe PID 1056 wrote to memory of 1320 1056 iexplore.exe IEXPLORE.EXE PID 1056 wrote to memory of 1320 1056 iexplore.exe IEXPLORE.EXE PID 1056 wrote to memory of 1320 1056 iexplore.exe IEXPLORE.EXE PID 1056 wrote to memory of 1320 1056 iexplore.exe IEXPLORE.EXE -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0AACF2C41BA9B872A52055FFCAEAEF15.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0AACF2C41BA9B872A52055FFCAEAEF15.dll2⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /Quiet3⤵
- Interacts with shadow copies
PID:1356
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\0F742378.bat" "C:\Users\Admin\AppData\Local\Temp\0AACF2C41BA9B872A52055FFCAEAEF15.dll""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\0AACF2C41BA9B872A52055FFCAEAEF15.dll"4⤵
- Views/modifies file attributes
PID:1596
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:572
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RecoveryManual.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
MD5
ca6514e88429e60e900610a64e2e67da
SHA19a93991178c54bd58f7f6ac7612e0da2f9be2090
SHA256099a1c395da31c35e9dd97bc0fbe64ba80433aea3c46e38ae86230935ec711dc
SHA512843c609e862f48a3a4a5b8f2e296f701a7328f4f27435dcfc428cf0a22100242be87aba40508be959979d8824bac75664531027c12f7cfbe3da4d91a6e657438
-
MD5
4743c340a4d1b7ec6f7939e8748cc849
SHA1664c9109dfd77177bd6c7b609432dda0076c0dd7
SHA2568142692301e671a81c63c4e7235ee0a396173dbfeae2902afad7b1dfd67cbf54
SHA512da564d2cf0e2d0c86d4535ebdb9ddf39e186f15ad5b4fe20cd560d5d2dddbf0a3bf0efb6de4bd3f14cd65187f0055ce1f45ce6f7697a20af8df75be7b332d307