Analysis
-
max time kernel
16s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
12-05-2021 17:02
Static task
static1
Behavioral task
behavioral1
Sample
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe
Resource
win10v20210410
General
-
Target
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe
-
Size
47KB
-
MD5
1089e51d09d2faa1956fd04bbbb4c6b4
-
SHA1
e40944f5a2924a0b9ead8fdebd058755e35cde0b
-
SHA256
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81
-
SHA512
eb1b62d9ad8489a1037edb99b4dbb64300d8c7ec7e9b015139db35107716f946ab4ebadaef696b63e116a5ee9bd451dd164a4cce376959d1cefe6c5ccff4fce1
Malware Config
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exedescription ioc process File opened for modification \??\c:\Users\Admin\Pictures\InvokeSearch.tiff 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\BackupAdd.tiff 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File renamed C:\Users\Admin\Pictures\DebugTrace.png => \??\c:\Users\Admin\Pictures\DebugTrace.png.ReadManual.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File renamed C:\Users\Admin\Pictures\GrantUndo.raw => \??\c:\Users\Admin\Pictures\GrantUndo.raw.ReadManual.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File renamed C:\Users\Admin\Pictures\InvokeSearch.tiff => \??\c:\Users\Admin\Pictures\InvokeSearch.tiff.ReadManual.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File renamed C:\Users\Admin\Pictures\RedoTrace.png => \??\c:\Users\Admin\Pictures\RedoTrace.png.ReadManual.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File renamed C:\Users\Admin\Pictures\RestartDisable.tif => \??\c:\Users\Admin\Pictures\RestartDisable.tif.ReadManual.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File renamed C:\Users\Admin\Pictures\AssertOptimize.png => \??\c:\Users\Admin\Pictures\AssertOptimize.png.ReadManual.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File renamed C:\Users\Admin\Pictures\BackupAdd.tiff => \??\c:\Users\Admin\Pictures\BackupAdd.tiff.ReadManual.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1544 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
Processes:
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exedescription ioc process File opened for modification \??\c:\Users\Admin\Music\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe -
Drops file in Program Files directory 3 IoCs
Processes:
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exedescription ioc process File created \??\c:\Program Files\RecoveryManual.html 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File created \??\c:\Program Files (x86)\RecoveryManual.html 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe File created \??\c:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RecoveryManual.html 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe -
Modifies registry class 5 IoCs
Processes:
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.1DB16BB9\shell\Open 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.1DB16BB9\shell\Open\command\ = "explorer.exe RecoveryManual.html" 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.1DB16BB9\shell\Open\command 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.1DB16BB9 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.1DB16BB9\shell 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exepid process 1116 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe 1116 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exedescription pid process Token: SeRestorePrivilege 1116 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.execmd.exedescription pid process target process PID 1116 wrote to memory of 1544 1116 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe cmd.exe PID 1116 wrote to memory of 1544 1116 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe cmd.exe PID 1116 wrote to memory of 1544 1116 8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe cmd.exe PID 1544 wrote to memory of 332 1544 cmd.exe attrib.exe PID 1544 wrote to memory of 332 1544 cmd.exe attrib.exe PID 1544 wrote to memory of 332 1544 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe"C:\Users\Admin\AppData\Local\Temp\8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\0F744AF5.bat" "C:\Users\Admin\AppData\Local\Temp\8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\8b539f3ba05fe82c4f992ffbeb6ab55151b36dce2d03b64721e966dedf82be81.bin.exe"3⤵
- Views/modifies file attributes
PID:332
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611