Analysis
-
max time kernel
15s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
03-05-2021 12:06
Static task
static1
Behavioral task
behavioral1
Sample
c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe
Resource
win7v20210410
General
-
Target
c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe
-
Size
331KB
-
MD5
94c33eb1b3a778c5b38d55c5fd40f2ab
-
SHA1
10e1a14fc45346a5d4bccfff8d46bf90929fc66c
-
SHA256
c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3
-
SHA512
92b5cbde3ed79d4b1a2fccf8fc29f8d2b5a18ed158bccdda2350b6802d774bd4e2c083b31a9fdb81b67b1712fa9fce175d2e28fded75e0ba0a3918d52c00ffb9
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exepid process 3724 c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exedescription pid process target process PID 3724 set thread context of 3508 3724 c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exepid process 3724 c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
svchost.exedescription pid process Token: SeImpersonatePrivilege 3508 svchost.exe Token: SeTcbPrivilege 3508 svchost.exe Token: SeChangeNotifyPrivilege 3508 svchost.exe Token: SeCreateTokenPrivilege 3508 svchost.exe Token: SeBackupPrivilege 3508 svchost.exe Token: SeRestorePrivilege 3508 svchost.exe Token: SeIncreaseQuotaPrivilege 3508 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3508 svchost.exe Token: SeImpersonatePrivilege 3508 svchost.exe Token: SeTcbPrivilege 3508 svchost.exe Token: SeChangeNotifyPrivilege 3508 svchost.exe Token: SeCreateTokenPrivilege 3508 svchost.exe Token: SeBackupPrivilege 3508 svchost.exe Token: SeRestorePrivilege 3508 svchost.exe Token: SeIncreaseQuotaPrivilege 3508 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3508 svchost.exe Token: SeImpersonatePrivilege 3508 svchost.exe Token: SeTcbPrivilege 3508 svchost.exe Token: SeChangeNotifyPrivilege 3508 svchost.exe Token: SeCreateTokenPrivilege 3508 svchost.exe Token: SeBackupPrivilege 3508 svchost.exe Token: SeRestorePrivilege 3508 svchost.exe Token: SeIncreaseQuotaPrivilege 3508 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3508 svchost.exe Token: SeImpersonatePrivilege 3508 svchost.exe Token: SeTcbPrivilege 3508 svchost.exe Token: SeChangeNotifyPrivilege 3508 svchost.exe Token: SeCreateTokenPrivilege 3508 svchost.exe Token: SeBackupPrivilege 3508 svchost.exe Token: SeRestorePrivilege 3508 svchost.exe Token: SeIncreaseQuotaPrivilege 3508 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3508 svchost.exe Token: SeImpersonatePrivilege 3508 svchost.exe Token: SeTcbPrivilege 3508 svchost.exe Token: SeChangeNotifyPrivilege 3508 svchost.exe Token: SeCreateTokenPrivilege 3508 svchost.exe Token: SeBackupPrivilege 3508 svchost.exe Token: SeRestorePrivilege 3508 svchost.exe Token: SeIncreaseQuotaPrivilege 3508 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3508 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exesvchost.exedescription pid process target process PID 3724 wrote to memory of 3508 3724 c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe svchost.exe PID 3724 wrote to memory of 3508 3724 c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe svchost.exe PID 3724 wrote to memory of 3508 3724 c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe svchost.exe PID 3724 wrote to memory of 3508 3724 c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe svchost.exe PID 3508 wrote to memory of 3180 3508 svchost.exe cmd.exe PID 3508 wrote to memory of 3180 3508 svchost.exe cmd.exe PID 3508 wrote to memory of 3180 3508 svchost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe"C:\Users\Admin\AppData\Local\Temp\c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\c4c21a36bd1f32a71dd00f0bd2fa78c9ab6cc9df30de77f4f99cb5d0da080cb3.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\259272359.bat" "C:\Windows\SysWOW64\svchost.exe" "3⤵PID:3180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
MD5
587481ce209ff25391ce17827c464cf8
SHA10a20871ae621d6f75e74bf5c4f1ef80333201f89
SHA256f5ffc43f62751866c978c1d5bd24eb7cc1863f58ca22cc12fc333bf9ad667140
SHA512ff637dbdb1b11a8cbbe8a713ed9cd06728aa9d462986c0330712d879449540488b9ee06b24afbce18638fe839b9029e9ca1ab08215d32060608afe8746e2ce78