Analysis
-
max time kernel
92s -
max time network
56s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18/05/2021, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
data.cmp.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
data.cmp.exe
Resource
win10v20210408
General
-
Target
data.cmp.exe
-
Size
281KB
-
MD5
0e61e496fc218c1c6dc1f5640a3ac7e5
-
SHA1
aae1b11aa9f2b0a2e32577db8026b843dc16a79d
-
SHA256
a0070951284e17ec843b498d0a11f4a2ebb8ce64c9f27faf7af96124fd691b1e
-
SHA512
7b7d6acf3a8f1f2c948cdac035543715d0dc235a169f01127579685f54c7851b06130d5ac4db9345cdb2a6fedfec0395fe306d2f2f2a2bfa45847e325e0c49fd
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
http://7puh3g2lpzut32wetfpohiireazmhoyrkllqescem2jd567rdur2ojyd.onion/contact/5940DACA
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.hta
http://7puh3g2lpzut32wetfpohiireazmhoyrkllqescem2jd567rdur2ojyd.onion/contact/5940DACA
http://decryptmyfiles.top/contact/5940DACA
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.hta data.cmp.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2280 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3196 vssvc.exe Token: SeRestorePrivilege 3196 vssvc.exe Token: SeAuditPrivilege 3196 vssvc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 668 wrote to memory of 2236 668 data.cmp.exe 78 PID 668 wrote to memory of 2236 668 data.cmp.exe 78 PID 668 wrote to memory of 2236 668 data.cmp.exe 78 PID 2236 wrote to memory of 1380 2236 cmd.exe 80 PID 2236 wrote to memory of 1380 2236 cmd.exe 80 PID 2236 wrote to memory of 1380 2236 cmd.exe 80 PID 668 wrote to memory of 1160 668 data.cmp.exe 82 PID 668 wrote to memory of 1160 668 data.cmp.exe 82 PID 668 wrote to memory of 1160 668 data.cmp.exe 82 PID 668 wrote to memory of 2124 668 data.cmp.exe 84 PID 668 wrote to memory of 2124 668 data.cmp.exe 84 PID 668 wrote to memory of 2124 668 data.cmp.exe 84 PID 668 wrote to memory of 3560 668 data.cmp.exe 85 PID 668 wrote to memory of 3560 668 data.cmp.exe 85 PID 668 wrote to memory of 3560 668 data.cmp.exe 85 PID 1160 wrote to memory of 2280 1160 cmd.exe 89 PID 1160 wrote to memory of 2280 1160 cmd.exe 89 PID 1160 wrote to memory of 2280 1160 cmd.exe 89 PID 4016 wrote to memory of 2156 4016 explorer.exe 91 PID 4016 wrote to memory of 2156 4016 explorer.exe 91 PID 4016 wrote to memory of 2156 4016 explorer.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\data.cmp.exe"C:\Users\Admin\AppData\Local\Temp\data.cmp.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start "" "explorer.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.hta2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\explorer.exe"explorer.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.hta3⤵PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:3560
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:2156
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3196