Overview
overview
10Static
static
100033c6e1db...le.exe
windows7_x64
100033c6e1db...le.exe
windows10_x64
1002665fcf9c...le.exe
windows7_x64
1002665fcf9c...le.exe
windows10_x64
101c4b55fefc...le.exe
windows7_x64
101c4b55fefc...le.exe
windows10_x64
1048be948c33...le.exe
windows7_x64
1048be948c33...le.exe
windows10_x64
10714f630043...le.exe
windows7_x64
10714f630043...le.exe
windows10_x64
107932343454...le.exe
windows7_x64
107932343454...le.exe
windows10_x64
10aa3e530d45...le.exe
windows7_x64
8aa3e530d45...le.exe
windows10_x64
10b6f774f469...le.exe
windows7_x64
10b6f774f469...le.exe
windows10_x64
10b739791dd0...le.exe
windows7_x64
10b739791dd0...le.exe
windows10_x64
10d6cb46d0b3...le.exe
windows7_x64
10d6cb46d0b3...le.exe
windows10_x64
10e1c46a96ef...le.exe
windows7_x64
10e1c46a96ef...le.exe
windows10_x64
10Analysis
-
max time kernel
3s -
max time network
2s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-05-2021 09:57
Static task
static1
Behavioral task
behavioral1
Sample
0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
02665fcf9c0ddfb2cd3e04d254f60c5a4453947f7c3df5480316a040c0c8686f.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
02665fcf9c0ddfb2cd3e04d254f60c5a4453947f7c3df5480316a040c0c8686f.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
714f630043670cdab4475971a255d836a1366e417cd0b60053bf026551d62409.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
714f630043670cdab4475971a255d836a1366e417cd0b60053bf026551d62409.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
79323434542bf442218be77d3982e167e118dc9954ce9ea1726db42bcac4d249.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
79323434542bf442218be77d3982e167e118dc9954ce9ea1726db42bcac4d249.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
aa3e530d4567c1511126029fac0562ba8aa4ead0a01aceea169ade3e38a37ea7.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
aa3e530d4567c1511126029fac0562ba8aa4ead0a01aceea169ade3e38a37ea7.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
b6f774f46949d54a060dabf2d7d08eef9fd390091f419ce1a2b555bcd58b2d32.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
b6f774f46949d54a060dabf2d7d08eef9fd390091f419ce1a2b555bcd58b2d32.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
d6cb46d0b3165c6087b15378ac7742c93cae7b5cf81c00d5fcb37a429b705d00.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
d6cb46d0b3165c6087b15378ac7742c93cae7b5cf81c00d5fcb37a429b705d00.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral22
Sample
e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.bin.sample.exe
Resource
win10v20210408
General
-
Target
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe
-
Size
393KB
-
MD5
104b68a8b7e2913139049b30847f990f
-
SHA1
0f25791a039298be94a3d024f5a3d1796e13a587
-
SHA256
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424
-
SHA512
cba38f93247621cc38ea33f72efc1147e0a6d1a8b9256a26853ac3c1c8c3c9444d2d3a5af586e934febad1822c93fbc1e9c538759b4587720ba03a92792ce04d
Malware Config
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\file.exe disable_win_def C:\Users\Admin\AppData\Local\Temp\file.exe disable_win_def -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe,C:\\Windows\\system32\\userinit.exe" reg.exe -
Thanos Ransomware
Ransomware-as-a-service (RaaS) sold through underground forums.
-
Thanos executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\file.exe family_thanos_ransomware C:\Users\Admin\AppData\Local\Temp\file.exe family_thanos_ransomware -
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
-
Executes dropped EXE 1 IoCs
Processes:
file.exepid process 1152 file.exe -
Processes:
file.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features file.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe 1152 file.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
file.exeshutdown.exedescription pid process Token: SeDebugPrivilege 1152 file.exe Token: SeShutdownPrivilege 1524 shutdown.exe Token: SeRemoteShutdownPrivilege 1524 shutdown.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exefile.exedescription pid process target process PID 1732 wrote to memory of 1152 1732 b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe file.exe PID 1732 wrote to memory of 1152 1732 b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe file.exe PID 1732 wrote to memory of 1152 1732 b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe file.exe PID 1152 wrote to memory of 1344 1152 file.exe conhost.exe PID 1152 wrote to memory of 1344 1152 file.exe conhost.exe PID 1152 wrote to memory of 1344 1152 file.exe conhost.exe PID 1152 wrote to memory of 1364 1152 file.exe bcdedit.exe PID 1152 wrote to memory of 1364 1152 file.exe bcdedit.exe PID 1152 wrote to memory of 1364 1152 file.exe bcdedit.exe PID 1152 wrote to memory of 612 1152 file.exe reg.exe PID 1152 wrote to memory of 612 1152 file.exe reg.exe PID 1152 wrote to memory of 612 1152 file.exe reg.exe PID 1152 wrote to memory of 1944 1152 file.exe net.exe PID 1152 wrote to memory of 1944 1152 file.exe net.exe PID 1152 wrote to memory of 1944 1152 file.exe net.exe PID 1152 wrote to memory of 1524 1152 file.exe shutdown.exe PID 1152 wrote to memory of 1524 1152 file.exe shutdown.exe PID 1152 wrote to memory of 1524 1152 file.exe shutdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\file.exe"file.exe"2⤵
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\reg.exe"reg.exe" delete HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend /f3⤵
- Modifies registry key
PID:1344
-
-
C:\Windows\system32\bcdedit.exe"bcdedit.exe" /set {default} safeboot network3⤵
- Modifies boot configuration data using bcdedit
PID:1364
-
-
C:\Windows\system32\reg.exe"reg.exe" add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\file.exe","C:\Windows\system32\userinit.exe" /f3⤵
- Modifies WinLogon for persistence
PID:612
-
-
C:\Windows\system32\net.exe"net.exe" user Admin ""3⤵PID:1944
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin ""4⤵PID:1660
-
-
-
C:\Windows\system32\shutdown.exe"shutdown.exe" /r /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵PID:1528
-
-
C:\Windows\system32\net.exe"net.exe" stop mfewc /y3⤵PID:1644
-
-
C:\Windows\system32\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y3⤵PID:1740
-
-
C:\Windows\system32\net.exe"net.exe" stop VeeamDeploymentService /y3⤵PID:1576
-
-
C:\Windows\system32\net.exe"net.exe" stop VeeamTransportSvc /y3⤵PID:328
-
-
C:\Windows\system32\net.exe"net.exe" stop VSNAPVSS /y3⤵PID:1792
-
-
C:\Windows\system32\net.exe"net.exe" stop stc_raw_agent /y3⤵PID:1820
-
-
C:\Windows\system32\net.exe"net.exe" stop zhudongfangyu /y3⤵PID:1756
-
-
C:\Windows\system32\net.exe"net.exe" stop YooIT /y3⤵PID:1928
-
-
C:\Windows\system32\net.exe"net.exe" stop YooBackup /y3⤵PID:1984
-
-
C:\Windows\system32\net.exe"net.exe" stop QBCFMonitorService /y3⤵PID:1380
-
-
C:\Windows\system32\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y3⤵PID:1208
-
-
C:\Windows\system32\net.exe"net.exe" stop QBIDPService /y3⤵PID:480
-
-
C:\Windows\system32\net.exe"net.exe" stop QBFCService /y3⤵PID:916
-
-
C:\Windows\system32\net.exe"net.exe" stop RTVscan /y3⤵PID:960
-
-
C:\Windows\system32\net.exe"net.exe" stop SavRoam /y3⤵PID:812
-
-
C:\Windows\system32\net.exe"net.exe" stop ccSetMgr /y3⤵PID:1192
-
-
C:\Windows\system32\net.exe"net.exe" stop ccEvtMgr /y3⤵PID:1488
-
-
C:\Windows\system32\net.exe"net.exe" stop DefWatch /y3⤵PID:580
-
-
C:\Windows\system32\net.exe"net.exe" stop BMR Boot Service /y3⤵PID:1316
-
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeDLPAgentService /y3⤵PID:1652
-
-
C:\Windows\system32\net.exe"net.exe" stop avpsus /y3⤵PID:1076
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1772
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "188095522-175523635295267694-1013923470-2110761987932423451-1786827165-40800582"1⤵PID:1344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e01e11dca5e8b08fc8231b1cb6e2048c
SHA14983d07f004436caa3f10b38adacbba6a4ede01a
SHA25658bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f
SHA512298bfb9fe55ddd80f1c6671622d7e9e865899a855b5bb8e0d85d8520160cedca6fd8bc72c9881925477bcab883bf6e6f4c69f997b774b74fe992e023a81269de
-
MD5
e01e11dca5e8b08fc8231b1cb6e2048c
SHA14983d07f004436caa3f10b38adacbba6a4ede01a
SHA25658bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f
SHA512298bfb9fe55ddd80f1c6671622d7e9e865899a855b5bb8e0d85d8520160cedca6fd8bc72c9881925477bcab883bf6e6f4c69f997b774b74fe992e023a81269de