Analysis
-
max time kernel
23s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05/06/2021, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
locker.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
locker.exe
Resource
win10v20210410
General
-
Target
locker.exe
-
Size
448KB
-
MD5
306c47fcb51611bee1ef804c95c7007f
-
SHA1
9cb58078b3fe2119329e482561d0c7cb740e937c
-
SHA256
877c612cf42d85b943010437599b828383ecdf02a17e2b017367db34637e5463
-
SHA512
3ca64189450cf3c3e9867d79c66ee428a5b72b1f45c06243a4a6ab64a2dfd8970d19dc1fba6404468650afac5341a0affae61e05de501180ec6ead20c333f720
Malware Config
Extracted
C:\Users\Admin\Desktop\PROTECT_INFO.TXT
http://dqybwoze7ow3xlamurpfppai4pd6lwybwix2nbhyhcnpsuj3yv32mnyd.onion/index.php
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1796 bcdedit.exe 1524 bcdedit.exe -
pid Process 2360 wbadmin.exe -
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ClearRead.raw.nermer locker.exe File created C:\Users\Admin\Pictures\PublishEdit.raw.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\CloseUnprotect.tiff.nermer locker.exe File created C:\Users\Admin\Pictures\HideTest.png.nermer locker.exe File created C:\Users\Admin\Pictures\InvokeSubmit.crw.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\InvokeSubmit.crw.nermer locker.exe File created C:\Users\Admin\Pictures\WatchPublish.crw.nermer locker.exe File created C:\Users\Admin\Pictures\CloseUnprotect.tiff.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\HideTest.png.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\PublishEdit.raw.nermer locker.exe File created C:\Users\Admin\Pictures\UpdateGrant.tiff.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\ClearRead.raw.nermer locker.exe File created C:\Users\Admin\Pictures\ResolveDisable.raw.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\ResolveDisable.raw.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\UpdateGrant.tiff.nermer locker.exe File opened for modification C:\Users\Admin\Pictures\WatchPublish.crw.nermer locker.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\F: locker.exe File opened (read-only) \??\J: locker.exe File opened (read-only) \??\Q: locker.exe File opened (read-only) \??\H: locker.exe File opened (read-only) \??\V: locker.exe File opened (read-only) \??\O: locker.exe File opened (read-only) \??\Y: locker.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\A: locker.exe File opened (read-only) \??\L: locker.exe File opened (read-only) \??\R: locker.exe File opened (read-only) \??\T: locker.exe File opened (read-only) \??\P: locker.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\K: locker.exe File opened (read-only) \??\M: locker.exe File opened (read-only) \??\N: locker.exe File opened (read-only) \??\U: locker.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\B: locker.exe File opened (read-only) \??\E: locker.exe File opened (read-only) \??\I: locker.exe File opened (read-only) \??\W: locker.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\G: locker.exe File opened (read-only) \??\S: locker.exe File opened (read-only) \??\X: locker.exe File opened (read-only) \??\Z: locker.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4068 vssadmin.exe 2648 vssadmin.exe 3976 vssadmin.exe 4340 vssadmin.exe 492 vssadmin.exe 5064 vssadmin.exe 3840 vssadmin.exe 4116 vssadmin.exe 4184 vssadmin.exe 4300 vssadmin.exe 4304 vssadmin.exe 1180 vssadmin.exe 1532 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe 4452 locker.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeBackupPrivilege 5116 vssvc.exe Token: SeRestorePrivilege 5116 vssvc.exe Token: SeAuditPrivilege 5116 vssvc.exe Token: SeIncreaseQuotaPrivilege 2732 wmic.exe Token: SeSecurityPrivilege 2732 wmic.exe Token: SeTakeOwnershipPrivilege 2732 wmic.exe Token: SeLoadDriverPrivilege 2732 wmic.exe Token: SeSystemProfilePrivilege 2732 wmic.exe Token: SeSystemtimePrivilege 2732 wmic.exe Token: SeProfSingleProcessPrivilege 2732 wmic.exe Token: SeIncBasePriorityPrivilege 2732 wmic.exe Token: SeCreatePagefilePrivilege 2732 wmic.exe Token: SeBackupPrivilege 2732 wmic.exe Token: SeRestorePrivilege 2732 wmic.exe Token: SeShutdownPrivilege 2732 wmic.exe Token: SeDebugPrivilege 2732 wmic.exe Token: SeSystemEnvironmentPrivilege 2732 wmic.exe Token: SeRemoteShutdownPrivilege 2732 wmic.exe Token: SeUndockPrivilege 2732 wmic.exe Token: SeManageVolumePrivilege 2732 wmic.exe Token: 33 2732 wmic.exe Token: 34 2732 wmic.exe Token: 35 2732 wmic.exe Token: 36 2732 wmic.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4452 wrote to memory of 5064 4452 locker.exe 76 PID 4452 wrote to memory of 5064 4452 locker.exe 76 PID 4452 wrote to memory of 4068 4452 locker.exe 80 PID 4452 wrote to memory of 4068 4452 locker.exe 80 PID 4452 wrote to memory of 3840 4452 locker.exe 82 PID 4452 wrote to memory of 3840 4452 locker.exe 82 PID 4452 wrote to memory of 2648 4452 locker.exe 84 PID 4452 wrote to memory of 2648 4452 locker.exe 84 PID 4452 wrote to memory of 4116 4452 locker.exe 86 PID 4452 wrote to memory of 4116 4452 locker.exe 86 PID 4452 wrote to memory of 3976 4452 locker.exe 88 PID 4452 wrote to memory of 3976 4452 locker.exe 88 PID 4452 wrote to memory of 4184 4452 locker.exe 90 PID 4452 wrote to memory of 4184 4452 locker.exe 90 PID 4452 wrote to memory of 4300 4452 locker.exe 92 PID 4452 wrote to memory of 4300 4452 locker.exe 92 PID 4452 wrote to memory of 4304 4452 locker.exe 94 PID 4452 wrote to memory of 4304 4452 locker.exe 94 PID 4452 wrote to memory of 4340 4452 locker.exe 96 PID 4452 wrote to memory of 4340 4452 locker.exe 96 PID 4452 wrote to memory of 492 4452 locker.exe 98 PID 4452 wrote to memory of 492 4452 locker.exe 98 PID 4452 wrote to memory of 1180 4452 locker.exe 100 PID 4452 wrote to memory of 1180 4452 locker.exe 100 PID 4452 wrote to memory of 1532 4452 locker.exe 102 PID 4452 wrote to memory of 1532 4452 locker.exe 102 PID 4452 wrote to memory of 1796 4452 locker.exe 104 PID 4452 wrote to memory of 1796 4452 locker.exe 104 PID 4452 wrote to memory of 1524 4452 locker.exe 106 PID 4452 wrote to memory of 1524 4452 locker.exe 106 PID 4452 wrote to memory of 2360 4452 locker.exe 108 PID 4452 wrote to memory of 2360 4452 locker.exe 108 PID 4452 wrote to memory of 2732 4452 locker.exe 110 PID 4452 wrote to memory of 2732 4452 locker.exe 110 PID 4452 wrote to memory of 3860 4452 locker.exe 116 PID 4452 wrote to memory of 3860 4452 locker.exe 116 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" locker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\locker.exe"C:\Users\Admin\AppData\Local\Temp\locker.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4452 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:5064
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:4068
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3840
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2648
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4116
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3976
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4184
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4300
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4304
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4340
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:492
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1180
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1532
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:1796
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1524
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:2360
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\locker.exe >> NUL2⤵PID:3860
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5116