Analysis

  • max time kernel
    20s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    31-03-2021 11:40

General

  • Target

    b07e554eff514d0dd77f3cf52e011fe315c21054053032a64c70699fe5336894.bin.sample.dll

  • Size

    118KB

  • MD5

    2f21dd9d6c0862dad443a5c95420816f

  • SHA1

    ab888a86691db3a013d97e38865cb5f289e30e65

  • SHA256

    b07e554eff514d0dd77f3cf52e011fe315c21054053032a64c70699fe5336894

  • SHA512

    ffce995792446ac40c4f1bc3da86363fb892da7b2a9d673f328b9cf9bb4a7dc9d134a26cdb472aefeeb9d6afcdc2a39107c90c286a30837fb168998c6f9de24b

Score
10/10

Malware Config

Signatures

  • MountLocker Ransomware

    Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops desktop.ini file(s) 26 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b07e554eff514d0dd77f3cf52e011fe315c21054053032a64c70699fe5336894.bin.sample.dll
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\\0F745908.bat" "C:\Users\Admin\AppData\Local\Temp\b07e554eff514d0dd77f3cf52e011fe315c21054053032a64c70699fe5336894.bin.sample.dll""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\system32\attrib.exe
        attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\b07e554eff514d0dd77f3cf52e011fe315c21054053032a64c70699fe5336894.bin.sample.dll"
        3⤵
        • Views/modifies file attributes
        PID:1656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/292-2-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

    Filesize

    8KB

  • memory/292-3-0x00000000003D0000-0x00000000003E2000-memory.dmp

    Filesize

    72KB