Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
12-05-2021 17:04
Static task
static1
Behavioral task
behavioral1
Sample
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe
Resource
win10v20210410
General
-
Target
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe
-
Size
161KB
-
MD5
7f43257736fa07f70086aefe917096bf
-
SHA1
09c35d8d7d6d8aca94ad1f7236752ea877e93ecc
-
SHA256
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f
-
SHA512
a831267c79980a9cce218a1c670e2b740e87a43b39363202029f06f6a24e18be45ca06732aa4b4e40421843762a453b07c453db271848547539ceea7b12c358e
Malware Config
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\ReceiveSuspend.tiff => \??\c:\Users\Admin\Pictures\ReceiveSuspend.tiff.ReadManual.1804AE40 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File renamed C:\Users\Admin\Pictures\ResolveConvertTo.crw => \??\c:\Users\Admin\Pictures\ResolveConvertTo.crw.ReadManual.1804AE40 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File renamed C:\Users\Admin\Pictures\TestReceive.tif => \??\c:\Users\Admin\Pictures\TestReceive.tif.ReadManual.1804AE40 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File renamed C:\Users\Admin\Pictures\UndoShow.tif => \??\c:\Users\Admin\Pictures\UndoShow.tif.ReadManual.1804AE40 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File renamed C:\Users\Admin\Pictures\EditImport.raw => \??\c:\Users\Admin\Pictures\EditImport.raw.ReadManual.1804AE40 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File renamed C:\Users\Admin\Pictures\ExpandConnect.tif => \??\c:\Users\Admin\Pictures\ExpandConnect.tif.ReadManual.1804AE40 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\ReceiveSuspend.tiff b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe -
Drops desktop.ini file(s) 24 IoCs
Processes:
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exedescription ioc process File opened for modification \??\c:\Users\Admin\OneDrive\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\Camera Roll\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\Saved Pictures\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\AccountPictures\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe -
Drops file in Program Files directory 2 IoCs
Processes:
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exedescription ioc process File created \??\c:\Program Files\RecoveryManual.html b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe File created \??\c:\Program Files (x86)\RecoveryManual.html b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe -
Modifies registry class 5 IoCs
Processes:
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.1804AE40\shell\Open\command b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.1804AE40 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.1804AE40\shell b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.1804AE40\shell\Open b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.1804AE40\shell\Open\command\ = "explorer.exe RecoveryManual.html" b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exepid process 1892 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe 1892 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exedescription pid process Token: SeRestorePrivilege 1892 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.execmd.exedescription pid process target process PID 1892 wrote to memory of 2816 1892 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe cmd.exe PID 1892 wrote to memory of 2816 1892 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe cmd.exe PID 1892 wrote to memory of 2816 1892 b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe cmd.exe PID 2816 wrote to memory of 2444 2816 cmd.exe attrib.exe PID 2816 wrote to memory of 2444 2816 cmd.exe attrib.exe PID 2816 wrote to memory of 2444 2816 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe"C:\Users\Admin\AppData\Local\Temp\b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0F744481.bat" "C:\Users\Admin\AppData\Local\Temp\b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\b26749b17ca691328ba67ee49d4d9997c101966c607ab578afad204459b7bf8f.bin.exe"3⤵
- Views/modifies file attributes
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611