Resubmissions

16-04-2021 12:52

210416-xmdbnj2h4s 10

16-04-2021 11:48

210416-2lztezmva2 10

Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    16-04-2021 12:52

General

  • Target

    033f4aaa2ca181597644ae7d2f883e05c2d9eea669f71117a312cfd591303c4b.bin.sample.exe

  • Size

    1020KB

  • MD5

    c250e298e0a349e8d1faeb5ba6f4a853

  • SHA1

    71b774aa592ba435eb8260d6f16e36b67c51babe

  • SHA256

    033f4aaa2ca181597644ae7d2f883e05c2d9eea669f71117a312cfd591303c4b

  • SHA512

    700a09e44e9d2fd092904886e882e8deb5a6d17d34be8575df6367ef729627a180ee62ea59df6457d965fccbe27809895ca83e1e3b8b7e888f752173eba1cbe1

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\033f4aaa2ca181597644ae7d2f883e05c2d9eea669f71117a312cfd591303c4b.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\033f4aaa2ca181597644ae7d2f883e05c2d9eea669f71117a312cfd591303c4b.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3016
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3728
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:3700
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4000
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:3844
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2092
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:3692
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:744
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3260.0.938960621\1284522765" -parentBuildID 20200403170909 -prefsHandle 1496 -prefMapHandle 1488 -prefsLen 1 -prefMapSize 219680 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3260 "\\.\pipe\gecko-crash-server-pipe.3260" 1580 gpu
        3⤵
          PID:3692
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3260.3.609094933\1335136079" -childID 1 -isForBrowser -prefsHandle 2308 -prefMapHandle 2264 -prefsLen 122 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3260 "\\.\pipe\gecko-crash-server-pipe.3260" 1496 tab
          3⤵
            PID:3776
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3260.13.2100427919\244838590" -childID 2 -isForBrowser -prefsHandle 3472 -prefMapHandle 3468 -prefsLen 6979 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3260 "\\.\pipe\gecko-crash-server-pipe.3260" 3488 tab
            3⤵
              PID:4192
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3260.20.520111439\1851346064" -childID 3 -isForBrowser -prefsHandle 4664 -prefMapHandle 4276 -prefsLen 7750 -prefMapSize 219680 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3260 "\\.\pipe\gecko-crash-server-pipe.3260" 2772 tab
              3⤵
                PID:4632
              • C:\Program Files\Mozilla Firefox\uninstall\helper.exe
                "C:\Program Files\Mozilla Firefox\uninstall\helper.exe" /SetAsDefaultAppUser
                3⤵
                • Loads dropped DLL
                PID:4728
          • C:\Windows\ImmersiveControlPanel\SystemSettings.exe
            "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel
            1⤵
            • Checks SCSI registry key(s)
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4872
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:4368

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Privilege Escalation

            Bypass User Account Control

            1
            T1088

            Defense Evasion

            Bypass User Account Control

            1
            T1088

            Disabling Security Tools

            1
            T1089

            Modify Registry

            2
            T1112

            File Deletion

            2
            T1107

            Discovery

            System Information Discovery

            5
            T1082

            Query Registry

            3
            T1012

            Peripheral Device Discovery

            2
            T1120

            Impact

            Inhibit System Recovery

            2
            T1490

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Users\Admin\AppData\Local\Temp\nsn679A.tmp\CityHash.dll
              MD5

              737379945745bb94f8a0dadcc18cad8d

              SHA1

              6a1f497b4dc007f5935b66ec83b00e5a394332c6

              SHA256

              d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a

              SHA512

              c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

            • \Users\Admin\AppData\Local\Temp\nsn679A.tmp\CityHash.dll
              MD5

              737379945745bb94f8a0dadcc18cad8d

              SHA1

              6a1f497b4dc007f5935b66ec83b00e5a394332c6

              SHA256

              d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a

              SHA512

              c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

            • \Users\Admin\AppData\Local\Temp\nsn679A.tmp\System.dll
              MD5

              17ed1c86bd67e78ade4712be48a7d2bd

              SHA1

              1cc9fe86d6d6030b4dae45ecddce5907991c01a0

              SHA256

              bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

              SHA512

              0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

            • memory/2092-118-0x0000000000000000-mapping.dmp
            • memory/3260-120-0x0000000000000000-mapping.dmp
            • memory/3692-119-0x0000000000000000-mapping.dmp
            • memory/3692-122-0x0000000000000000-mapping.dmp
            • memory/3700-115-0x0000000000000000-mapping.dmp
            • memory/3728-114-0x0000000000000000-mapping.dmp
            • memory/3776-127-0x0000000000000000-mapping.dmp
            • memory/3844-117-0x0000000000000000-mapping.dmp
            • memory/4000-116-0x0000000000000000-mapping.dmp
            • memory/4192-130-0x0000000000000000-mapping.dmp
            • memory/4632-132-0x0000000000000000-mapping.dmp
            • memory/4728-133-0x0000000000000000-mapping.dmp
            • memory/4728-137-0x00000000027E0000-0x00000000027EF000-memory.dmp
              Filesize

              60KB