Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
105s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17/02/2021, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v20201028
General
-
Target
2.exe
-
Size
2.5MB
-
MD5
e63e41e15e86489a98dbeb2e6cb44e8a
-
SHA1
5815d349a375f5cdf090ababcff86b3946ed6c07
-
SHA256
0dd34e1326f18ab113be5ec91003577845f62ce25bbed8f92bff0b4077fe45da
-
SHA512
749d9580ac631916fbc1db207f0f48ed2ff9979f0cd8e352633cd86edfe7bd5bbb6da90b014e0b8ad639f8b9e567498f07353ef907ce2bd6dfa5536d3079991e
Malware Config
Extracted
C:\Users\Admin\Desktop\Recovery_Instructions.txt
Extracted
C:\Recovery_Instructions.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3836 bcdedit.exe 2616 bcdedit.exe -
pid Process 508 wbadmin.exe 3996 wbadmin.exe -
Drops file in Drivers directory 12 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\protocol.ReadInstructions 2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\networks 2.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 2.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\services 2.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\services.ReadInstructions 2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.ReadInstructions 2.exe File opened for modification C:\Windows\System32\drivers\etc\networks.ReadInstructions 2.exe -
Modifies extensions of user files 34 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SearchPush.tiff.inprocess 2.exe File renamed C:\Users\Admin\Pictures\SearchPush.tiff.inprocess => C:\Users\Admin\Pictures\SearchPush.tiff.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\SearchPush.tiff.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\OptimizeRead.raw.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\RepairCopy.tiff.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\WaitGrant.crw.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\CompareAdd.png.inprocess 2.exe File renamed C:\Users\Admin\Pictures\DismountCompare.tif => C:\Users\Admin\Pictures\DismountCompare.tif.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\DismountCompare.tif.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\CompareAdd.png.inprocess => C:\Users\Admin\Pictures\CompareAdd.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\SearchPush.tiff => C:\Users\Admin\Pictures\SearchPush.tiff.inprocess 2.exe File renamed C:\Users\Admin\Pictures\DismountCompare.tif.inprocess => C:\Users\Admin\Pictures\DismountCompare.tif.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\RepairCopy.tiff => C:\Users\Admin\Pictures\RepairCopy.tiff.inprocess 2.exe File renamed C:\Users\Admin\Pictures\WaitGrant.crw => C:\Users\Admin\Pictures\WaitGrant.crw.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\RepairCopy.tiff.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\ResumeUnregister.png.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\CompareAdd.png.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\DismountCompare.tif.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\RepairCopy.tiff 2.exe File opened for modification C:\Users\Admin\Pictures\ResumeUnregister.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\WaitGrant.crw.inprocess => C:\Users\Admin\Pictures\WaitGrant.crw.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\SearchPush.tiff 2.exe File opened for modification C:\Users\Admin\Pictures\UseReset.png.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\UseReset.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\CompareAdd.png => C:\Users\Admin\Pictures\CompareAdd.png.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\OptimizeRead.raw.inprocess 2.exe File renamed C:\Users\Admin\Pictures\OptimizeRead.raw.inprocess => C:\Users\Admin\Pictures\OptimizeRead.raw.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\ResumeUnregister.png.inprocess => C:\Users\Admin\Pictures\ResumeUnregister.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\UseReset.png => C:\Users\Admin\Pictures\UseReset.png.inprocess 2.exe File renamed C:\Users\Admin\Pictures\UseReset.png.inprocess => C:\Users\Admin\Pictures\UseReset.png.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\WaitGrant.crw.inprocess 2.exe File renamed C:\Users\Admin\Pictures\OptimizeRead.raw => C:\Users\Admin\Pictures\OptimizeRead.raw.inprocess 2.exe File renamed C:\Users\Admin\Pictures\RepairCopy.tiff.inprocess => C:\Users\Admin\Pictures\RepairCopy.tiff.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\ResumeUnregister.png => C:\Users\Admin\Pictures\ResumeUnregister.png.inprocess 2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/652-2-0x00007FF6CB7D0000-0x00007FF6CC011000-memory.dmp themida behavioral2/memory/652-3-0x00007FF6CB7D0000-0x00007FF6CC011000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2.exe\" e" 2.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run 2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini 2.exe -
Enumerates connected drives 3 TTPs 41 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 2.exe File opened (read-only) \??\Q: 2.exe File opened (read-only) \??\R: 2.exe File opened (read-only) \??\T: 2.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\F: 2.exe File opened (read-only) \??\X: 2.exe File opened (read-only) \??\K: 2.exe File opened (read-only) \??\N: 2.exe File opened (read-only) \??\O: 2.exe File opened (read-only) \??\U: 2.exe File opened (read-only) \??\E: 2.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\H: 2.exe File opened (read-only) \??\M: 2.exe File opened (read-only) \??\V: 2.exe File opened (read-only) \??\J: 2.exe File opened (read-only) \??\S: 2.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\G: 2.exe File opened (read-only) \??\D: 2.exe File opened (read-only) \??\B: 2.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\L: 2.exe File opened (read-only) \??\Z: 2.exe File opened (read-only) \??\I: 2.exe File opened (read-only) \??\W: 2.exe File opened (read-only) \??\Y: 2.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\A: 2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\ELAM 2.exe File opened for modification C:\Windows\System32\config\VSMIDK.inprocess 2.exe File opened for modification C:\Windows\System32\config\RegBack\DEFAULT 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\272cc0ac-516b-43d0-b371-37fd4c92d1e0 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 2.exe File opened for modification C:\Windows\System32\config\ELAM.inprocess 2.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\678096c8-b266-4d75-ab1d-0b7ef7584d24 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\678096c8-b266-4d75-ab1d-0b7ef7584d24.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 2.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\ELAM.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\SECURITY 2.exe File opened for modification C:\Windows\System32\config\VSMIDK 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\272cc0ac-516b-43d0-b371-37fd4c92d1e0.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83.inprocess 2.exe File opened for modification C:\Windows\System32\config\COMPONENTS.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\SAM 2.exe File opened for modification C:\Windows\System32\config\RegBack\SOFTWARE 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.inprocess 2.exe File opened for modification C:\Windows\System32\config\BBI 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.inprocess 2.exe File opened for modification C:\Windows\System32\ResPriHMImageList 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.inprocess 2.exe File opened for modification C:\Windows\System32\ResPriImageList 2.exe File opened for modification C:\Windows\System32\config\BCD-Template.ReadInstructions 2.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess 2.exe File opened for modification C:\Windows\System32\config\RegBack\SAM 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\678096c8-b266-4d75-ab1d-0b7ef7584d24.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\272cc0ac-516b-43d0-b371-37fd4c92d1e0.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred 2.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 2.exe File opened for modification C:\Windows\System32\config\SYSTEM 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\98301ca1-0a97-4b50-941d-2da843986a6e.inprocess 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\d8f02fab-50bd-431d-b24d-4a8829b3f813 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\BCD-Template 2.exe File opened for modification C:\Windows\System32\config\DEFAULT 2.exe File opened for modification C:\Windows\System32\config\RegBack\SYSTEM 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868 2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 652 2.exe -
Drops file in Program Files directory 49 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.ReadInstructions 2.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 2.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.ReadInstructions 2.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.ReadInstructions 2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 2.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 2.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.ReadInstructions 2.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess 2.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.ReadInstructions 2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 2.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 2.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 2.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} 2.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.inprocess 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6} 2.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4a1d5b5d-6336-41a4-a4da-b4af65e6deff.ReadInstructions 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} 2.exe File opened for modification C:\Windows\Panther\setupinfo.ReadInstructions 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 2.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0} 2.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.ReadInstructions 2.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.inprocess 2.exe File opened for modification C:\Windows\Panther\setupinfo 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00} 2.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97} 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F} 2.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.ReadInstructions 2.exe File opened for modification C:\Windows\Boot\PCAT\bootnxt 2.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660} 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE} 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.ReadInstructions 2.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} 2.exe File opened for modification C:\Windows\Resources\Maps\mwconfig_client 2.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD 2.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.inprocess 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4a1d5b5d-6336-41a4-a4da-b4af65e6deff 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7} 2.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C} 2.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.inprocess 2.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4a1d5b5d-6336-41a4-a4da-b4af65e6deff.inprocess 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} 2.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.ReadInstructions 2.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.ReadInstructions 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1500 vssadmin.exe 3628 vssadmin.exe 3960 vssadmin.exe 2284 vssadmin.exe 3924 vssadmin.exe 3728 vssadmin.exe 3348 vssadmin.exe 636 vssadmin.exe 3548 vssadmin.exe 416 vssadmin.exe 2580 vssadmin.exe 3916 vssadmin.exe 264 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2052 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe 652 2.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeBackupPrivilege 988 vssvc.exe Token: SeRestorePrivilege 988 vssvc.exe Token: SeAuditPrivilege 988 vssvc.exe Token: SeIncreaseQuotaPrivilege 2676 wmic.exe Token: SeSecurityPrivilege 2676 wmic.exe Token: SeTakeOwnershipPrivilege 2676 wmic.exe Token: SeLoadDriverPrivilege 2676 wmic.exe Token: SeSystemProfilePrivilege 2676 wmic.exe Token: SeSystemtimePrivilege 2676 wmic.exe Token: SeProfSingleProcessPrivilege 2676 wmic.exe Token: SeIncBasePriorityPrivilege 2676 wmic.exe Token: SeCreatePagefilePrivilege 2676 wmic.exe Token: SeBackupPrivilege 2676 wmic.exe Token: SeRestorePrivilege 2676 wmic.exe Token: SeShutdownPrivilege 2676 wmic.exe Token: SeDebugPrivilege 2676 wmic.exe Token: SeSystemEnvironmentPrivilege 2676 wmic.exe Token: SeRemoteShutdownPrivilege 2676 wmic.exe Token: SeUndockPrivilege 2676 wmic.exe Token: SeManageVolumePrivilege 2676 wmic.exe Token: 33 2676 wmic.exe Token: 34 2676 wmic.exe Token: 35 2676 wmic.exe Token: 36 2676 wmic.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 652 wrote to memory of 3960 652 2.exe 72 PID 652 wrote to memory of 3960 652 2.exe 72 PID 652 wrote to memory of 2284 652 2.exe 79 PID 652 wrote to memory of 2284 652 2.exe 79 PID 652 wrote to memory of 3548 652 2.exe 81 PID 652 wrote to memory of 3548 652 2.exe 81 PID 652 wrote to memory of 3924 652 2.exe 83 PID 652 wrote to memory of 3924 652 2.exe 83 PID 652 wrote to memory of 416 652 2.exe 85 PID 652 wrote to memory of 416 652 2.exe 85 PID 652 wrote to memory of 2580 652 2.exe 87 PID 652 wrote to memory of 2580 652 2.exe 87 PID 652 wrote to memory of 3916 652 2.exe 89 PID 652 wrote to memory of 3916 652 2.exe 89 PID 652 wrote to memory of 264 652 2.exe 91 PID 652 wrote to memory of 264 652 2.exe 91 PID 652 wrote to memory of 3728 652 2.exe 93 PID 652 wrote to memory of 3728 652 2.exe 93 PID 652 wrote to memory of 3348 652 2.exe 95 PID 652 wrote to memory of 3348 652 2.exe 95 PID 652 wrote to memory of 636 652 2.exe 97 PID 652 wrote to memory of 636 652 2.exe 97 PID 652 wrote to memory of 1500 652 2.exe 99 PID 652 wrote to memory of 1500 652 2.exe 99 PID 652 wrote to memory of 3628 652 2.exe 101 PID 652 wrote to memory of 3628 652 2.exe 101 PID 652 wrote to memory of 3836 652 2.exe 103 PID 652 wrote to memory of 3836 652 2.exe 103 PID 652 wrote to memory of 2616 652 2.exe 105 PID 652 wrote to memory of 2616 652 2.exe 105 PID 652 wrote to memory of 508 652 2.exe 107 PID 652 wrote to memory of 508 652 2.exe 107 PID 652 wrote to memory of 3996 652 2.exe 109 PID 652 wrote to memory of 3996 652 2.exe 109 PID 652 wrote to memory of 2676 652 2.exe 111 PID 652 wrote to memory of 2676 652 2.exe 111 PID 652 wrote to memory of 268 652 2.exe 117 PID 652 wrote to memory of 268 652 2.exe 117 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"1⤵
- Drops file in Drivers directory
- Modifies extensions of user files
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:652 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:3960
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:2284
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3548
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3924
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:416
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2580
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3916
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:264
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3728
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3348
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:636
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1500
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:3628
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:3836
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:2616
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:508
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:3996
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2.exe >> NUL2⤵PID:268
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:988
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Recovery_Instructions.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2052