Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
01-06-2021 06:24
Static task
static1
Behavioral task
behavioral1
Sample
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe
Resource
win10v20210410
General
-
Target
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe
-
Size
121KB
-
MD5
dda0c20d42fa0b376d1bc47389742646
-
SHA1
259270268c997a74af1046235ee83a1956fcde11
-
SHA256
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663
-
SHA512
2295ea37d6e56bf4cc9710094b021d48962d461802db3b8bab5358ad08287966c8b3f13037f81c6718a87edd90dd965c23246fb05e23b6dc0fee1f0e9ccba12c
Malware Config
Extracted
C:\79d3fm61sy-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/667DA0FE430F611A
http://decoder.re/667DA0FE430F611A
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies Installed Components in the registry 2 TTPs
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exedescription ioc process File opened for modification \??\c:\users\admin\pictures\ConvertConnect.tiff c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File renamed C:\Users\Admin\Pictures\ConvertConnect.tiff => \??\c:\users\admin\pictures\ConvertConnect.tiff.79d3fm61sy c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File renamed C:\Users\Admin\Pictures\FormatRemove.png => \??\c:\users\admin\pictures\FormatRemove.png.79d3fm61sy c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Drops startup file 3 IoCs
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exedescription ioc process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\79d3fm61sy-readme.txt c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\79d3fm61sy-readme.txt c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zQS1XtGvA8 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe" c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exedescription ioc process File opened for modification \??\c:\users\public\videos\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\sendto\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\local\microsoft\windows\winx\group1\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\local\microsoft\windows\winx\group3\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\music\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\pictures\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\internet explorer\quick launch\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\local\microsoft\windows\winx\group2\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\administrative tools\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files (x86)\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\documents\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\maintenance\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\windows powershell\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\videos\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\desktop\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessories\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\sendto\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessibility\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\recent\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\system tools\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\application shortcuts\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\searches\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\pictures\saved pictures\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\libraries\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\winx\group1\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\winx\group2\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\documents\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\accountpictures\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\downloads\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\system tools\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\accessories\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\windows powershell\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\system tools\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\$recycle.bin\s-1-5-21-3686645723-710336880-414668232-1000\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\onedrive\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessibility\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\administrative tools\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\pictures\camera roll\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\history\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\internet explorer\quick launch\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\accessibility\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\links\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessories\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\startup\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessories\system tools\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\libraries\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\burn\burn\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\internet explorer\quick launch\user pinned\taskbar\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\public\accountpictures\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\maintenance\Desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\winx\group3\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exedescription ioc process File opened (read-only) \??\J: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\L: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\X: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\Z: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\A: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\G: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\H: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\I: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\Y: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\F: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\N: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\T: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\U: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\K: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\R: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\S: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\D: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\P: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\Q: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\V: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\W: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\B: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\E: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\M: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened (read-only) \??\O: c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9yu5.bmp" c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Drops file in Program Files directory 24 IoCs
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exedescription ioc process File opened for modification \??\c:\program files\SetApprove.inf c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\SuspendInstall.search-ms c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files (x86)\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\FindUninstall.fon c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\ResumeSet.TS c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\MountUndo.php c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\RedoWatch.bat c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\desktop.ini c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\JoinTest.m1v c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\RegisterSelect.cab c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\RepairPop.htm c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\WaitInvoke.scf c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\MoveConvertTo.crw c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\OutAssert.ppsx c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\ConvertSubmit.cab c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\OutLock.html c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\ResetUnpublish.M2TS c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\StepCheckpoint.mpg c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\SubmitStop.M2V c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\UnpublishRestart.xlsx c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File created \??\c:\program files\79d3fm61sy-readme.txt c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File created \??\c:\program files (x86)\79d3fm61sy-readme.txt c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\UseGet.mp2 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe File opened for modification \??\c:\program files\WatchBlock.mov c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2816 3016 WerFault.exe 2224 3684 WerFault.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exeWerFault.exeWerFault.exepid process 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exevssvc.exeWerFault.exeexplorer.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe Token: SeTakeOwnershipPrivilege 1808 c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe Token: SeBackupPrivilege 752 vssvc.exe Token: SeRestorePrivilege 752 vssvc.exe Token: SeAuditPrivilege 752 vssvc.exe Token: SeDebugPrivilege 2816 WerFault.exe Token: SeShutdownPrivilege 3684 explorer.exe Token: SeCreatePagefilePrivilege 3684 explorer.exe Token: SeShutdownPrivilege 3684 explorer.exe Token: SeCreatePagefilePrivilege 3684 explorer.exe Token: SeShutdownPrivilege 3684 explorer.exe Token: SeCreatePagefilePrivilege 3684 explorer.exe Token: SeShutdownPrivilege 3684 explorer.exe Token: SeCreatePagefilePrivilege 3684 explorer.exe Token: SeDebugPrivilege 2224 WerFault.exe Token: SeShutdownPrivilege 3684 explorer.exe Token: SeCreatePagefilePrivilege 3684 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
explorer.exepid process 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
explorer.exepid process 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe 3684 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\c22affa4632283bb0dcf3f389d0acb2dcc4b3acbd1703956c5151884259f6663.bin.sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:8
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:752
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3016 -s 75921⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3684 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3684 -s 20842⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3686645723-710336880-414668232-1000\desktop.iniMD5
9d5a414f0cb0657efff729f25fc8c2c2
SHA1ffe199a639855b653bc4d7920b14b343e0a6d053
SHA25627d4731a2c5658659f389ee979c54557f41c8b5885fd02874e1f5ada17510c50
SHA51200deb57e8aae049f092a2b5584199f7a0f443f9fbab5b263a7f0bae3cc75d5313302bd8957a0b98e2d9f5061353a87101494903374424604d9e2f39d382dc753
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.79d3fm61syMD5
539e874ee6877f58bae482b133a6d689
SHA1ee769bca950479425b5b8b35a30a28e85a436535
SHA2564d07d82ebbbf1376616e5c07b9005a62c2aef6d8e427ba05183549504766b9d8
SHA5121617254395d55eb28dd627fa7f4b1605879f18e5d9a0866386a3c4d3a6f69e79c9e259aeac6414fffed27166a0f719960c9b6b728d018c9edbce83139c3df395
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_6b16a61a50e0401aa8778e92c6b6b2e2d2b85535_41822faa_cab_04749afd\Report.werMD5
88c64c02459e549ed03e6ae2de2e8fba
SHA11901d410db9275fdc5f2d1ac07169d6ceebde8ab
SHA25687e3afb831d5aaaf6d87c01e872e9dfcf62a85aad1831f74808de73a3b696136
SHA512139c1e00aece7a88dd1a40926a12c434eeebc218b18f94e9837e21d65b45c673aac1b7b58f345b7b32e81fd153a54077e1fbea83fe1eeab83f1b740e08287696
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_6b16a61a50e0401aa8778e92c6b6b2e2d2b85535_41822faa_cab_04749afd\WER9A03.tmp.WERInternalMetadata.xmlMD5
b193d2278f218d893820f8559d13d835
SHA1292a72274337becf4376d96b18a844fbb93e8328
SHA25680f21ca0aeae732309da6fba45173a4473ae6281a18a7349c76cb0aa98b9a0e7
SHA512337e6c04a826bb253e33291c6e0473a376337c65028077c2c0bdc080a66b10598653874838e4760c7353870fe6b4aa9f45b8309a63a6102f17715140b3bde12e
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_6b16a61a50e0401aa8778e92c6b6b2e2d2b85535_41822faa_cab_04749afd\WER9A13.tmp.csvMD5
6a2a7e9e5c602bff78285300c94e54e9
SHA18e72cdcfbf52db24753f88600503fb85a86c0fe7
SHA25614617ca67424115399e6b3c5c7bab84e63b8defcd90b5ac378a6ae029ec2bd8e
SHA5120ce9b722551825fcff19382391eda42a122ef81fd2f25bd914bedf2dfa46a7b3a889daa72ac95f8bcdc56845c5a25e65df01eb5bb800a989a73c8548fc1a69f4
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_6b16a61a50e0401aa8778e92c6b6b2e2d2b85535_41822faa_cab_04749afd\WER9A24.tmp.txtMD5
cadca5042dbdd6830b3a22a4dbbbb17a
SHA185ea61931bceb4b1b8bae4c3a947195a3a617326
SHA2569d4d291fa4d13bf8bd8cee989a85549099e08a86e917280888c21296eedb5c1d
SHA512725493ec0aab7b0a5932e501b95e090fccca5421325b0a13168d2acdea76266381aa059ec7813aa2475c26b699a4f8a19ab5b994af0e050f9263b79386606ec0
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_6b16a61a50e0401aa8778e92c6b6b2e2d2b85535_41822faa_cab_04749afd\WER9AC1.tmp.appcompat.txtMD5
92498bd0d631f63bd29f2ee1a35d8119
SHA13c91162cafce68751d5db76e6722ce0f37a8237a
SHA256b3e6ed61ba854c6a921ffff5e8e8df7458811639d772222a3079173061eb540f
SHA512f301c03356676d9338273a9ec1aa029e7aa73991a765c52d8881a6eae6d93203326b7f54fb7d5e960343c5f27faacafcd527d5e7bbe3d082186b83f4f66bc3ae
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_6b16a61a50e0401aa8778e92c6b6b2e2d2b85535_41822faa_cab_04749afd\memory.hdmpMD5
e5a781688ac6f7a2ab0ba29eebbfb812
SHA1ee538f20ce4af79094876cf619637fd24964406b
SHA2562588869ff1da2d88a695fd5eccebbd2218d0590769c7737e494579b34c120888
SHA512a304409dc646442e1b906ebe2070507c95d2fbebf0f2f0ae2809b5fdbc13baa4eeea4016d8aef4bd0322414ee98acca843dc2ed95ca6bb0b65bf49654d1fbc4d
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_6b16a61a50e0401aa8778e92c6b6b2e2d2b85535_41822faa_cab_04749afd\minidump.mdmpMD5
15f13e85d83fb2d292afe3041499eafb
SHA15ff8fc26012a7ff4271759911d699c379d0c8339
SHA256c8531cd4fd7ca743c034b736ecf1d09140a87d07f7d63db42d2416982b2863ea
SHA51260ad72c7dd8728f3315e99406eac84fbe62bad85d00c0f2e898ebbd9366e57842a6d6de1f0de806d456133e582e723d1526070cdae8c7dce8998ef7afd04dac9
-
C:\Users\Admin\AppData\Local\Temp\WAX9A72.tmpMD5
d943cee093683a362030c43cb6df7f78
SHA1dc6ed1ca15a0263c46d758f18f698364a0117485
SHA25643e4cba792b24acb602490d9b6869c338f42511bfa57968c51d2fa70923b33b8
SHA512a358b59778282170009583dde9dfd8a64b66fe564768ebb90f7d3cb47b49b55c3c54fd38ed30e1d59cba9c2e128b1836e4d9821843e7f8425174359bcd203032
-
C:\Users\Admin\AppData\Local\Temp\WER9AC1.tmp.appcompat.txtMD5
92498bd0d631f63bd29f2ee1a35d8119
SHA13c91162cafce68751d5db76e6722ce0f37a8237a
SHA256b3e6ed61ba854c6a921ffff5e8e8df7458811639d772222a3079173061eb540f
SHA512f301c03356676d9338273a9ec1aa029e7aa73991a765c52d8881a6eae6d93203326b7f54fb7d5e960343c5f27faacafcd527d5e7bbe3d082186b83f4f66bc3ae