Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 21:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe
-
Size
625KB
-
MD5
1934bc240ae9e8e101490a9dab13c079
-
SHA1
a0218048aaca34259d0651d911b81f9f12a30326
-
SHA256
c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3
-
SHA512
c7f3c47a2be2be14387f762164db8b4d097cddd1f72efa0e81e59379b1e44cb7f71b56c05920ecbadc6662c58d9bb84d2c8dd4ffae9ecbae67bf0d8978a8a5d5
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\RemoveDisconnect.tiff SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe File opened for modification \??\c:\Users\Admin\Pictures\RestoreRevoke.tiff SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe File opened for modification \??\c:\Users\Admin\Pictures\StepJoin.tiff SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe -
Deletes itself 1 IoCs
pid Process 1600 cmd.exe -
Modifies service 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\asasin.bmp" SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 968 vssadmin.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Control Panel\Desktop\WallpaperStyle = "0" SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Control Panel\Desktop\TileWallpaper = "0" SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000033044fc40189d459fe40d0e3dcc9b6600000000020000000000106600000001000020000000855fb3834b166c45f5daac5b27558077aabcd20f6c5a7aa6eebf1c9f9f1b74f2000000000e8000000002000020000000bae23ba89b6993f8788059506313cf80878ca5ec4f50c08043da1ec3c658abe920000000fc72d8390d2c6f89aeeb921ab83e945fddde5db3caeec34dac59713bbd05c5e440000000527571854846712b755133d574879cc0cd1c9a694e1787df26e1c84f740f5f657fab47aa87be9b35ebb920be76b14453017555be4489df1c9d59d56a554d65a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "311839210" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBF084F1-23E2-11EB-9964-C611B4A1F110} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ef8995efb7d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe Token: SeTakeOwnershipPrivilege 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe Token: SeBackupPrivilege 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe Token: SeRestorePrivilege 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe Token: SeBackupPrivilege 1580 vssvc.exe Token: SeRestorePrivilege 1580 vssvc.exe Token: SeAuditPrivilege 1580 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2036 iexplore.exe 1980 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 460 wrote to memory of 968 460 taskeng.exe 31 PID 460 wrote to memory of 968 460 taskeng.exe 31 PID 460 wrote to memory of 968 460 taskeng.exe 31 PID 1080 wrote to memory of 2036 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 36 PID 1080 wrote to memory of 2036 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 36 PID 1080 wrote to memory of 2036 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 36 PID 1080 wrote to memory of 2036 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 36 PID 1080 wrote to memory of 1600 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 39 PID 1080 wrote to memory of 1600 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 39 PID 1080 wrote to memory of 1600 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 39 PID 1080 wrote to memory of 1600 1080 SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe 39 PID 2036 wrote to memory of 1736 2036 iexplore.exe 41 PID 2036 wrote to memory of 1736 2036 iexplore.exe 41 PID 2036 wrote to memory of 1736 2036 iexplore.exe 41 PID 2036 wrote to memory of 1736 2036 iexplore.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe"1⤵
- Modifies extensions of user files
- Modifies service
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\asasin.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileCryptor.PTG.13500.21467.exe"2⤵
- Deletes itself
PID:1600
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
C:\Windows\system32\taskeng.exetaskeng.exe {60D0C371-E6AB-4A7F-B238-51082FFFDB7D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All2⤵
- Interacts with shadow copies
PID:968
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1980