Analysis

  • max time kernel
    15s
  • max time network
    117s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-04-2021 11:26

General

  • Target

    c64bf1a1e4d47232d1966ec0515f7d80503a001f42b8dd3c99459f94dc0b3132.exe

  • Size

    840KB

  • MD5

    6490aefbaf3e6a708269d771d8fd4136

  • SHA1

    2ae6c5f0ec0faca746bf6ba3f5c7682a454de78c

  • SHA256

    c64bf1a1e4d47232d1966ec0515f7d80503a001f42b8dd3c99459f94dc0b3132

  • SHA512

    6ef2fdfaae7db2dfc82c1600de2818c86b1be42bab42682aa27c37fd853a97e3316ac71081075994b3fa29a52c6f94cc29445dc2e5248d3e37ae31275f1e16f6

Score
9/10

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 26 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c64bf1a1e4d47232d1966ec0515f7d80503a001f42b8dd3c99459f94dc0b3132.exe
    "C:\Users\Admin\AppData\Local\Temp\c64bf1a1e4d47232d1966ec0515f7d80503a001f42b8dd3c99459f94dc0b3132.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C "icacls . /grant Everyone:F /T /C /Q"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Windows\SysWOW64\icacls.exe
        icacls . /grant Everyone:F /T /C /Q
        3⤵
        • Modifies file permissions
        PID:3388
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C "wbadmin delete catalog - quiet"
      2⤵
        PID:4168
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C "bcdedit /set { default } bootstatuspolicy ignoreallfailures"
        2⤵
          PID:3256
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C "bcdedit /set { default } recoveryenabled no"
          2⤵
            PID:4192
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C "wmic shadowcopy delete"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3336
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic shadowcopy delete
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1856
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C "vssadmin delete shadows /All /Quiet"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4008
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin delete shadows /All /Quiet
              3⤵
              • Interacts with shadow copies
              PID:4492
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4580

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        File Deletion

        2
        T1107

        File Permissions Modification

        1
        T1222

        Impact

        Inhibit System Recovery

        2
        T1490

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1856-121-0x0000000000000000-mapping.dmp
        • memory/3256-118-0x0000000000000000-mapping.dmp
        • memory/3336-119-0x0000000000000000-mapping.dmp
        • memory/3388-115-0x0000000000000000-mapping.dmp
        • memory/3908-114-0x0000000000000000-mapping.dmp
        • memory/4008-120-0x0000000000000000-mapping.dmp
        • memory/4168-116-0x0000000000000000-mapping.dmp
        • memory/4192-117-0x0000000000000000-mapping.dmp
        • memory/4492-122-0x0000000000000000-mapping.dmp