Analysis
-
max time kernel
142s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
17/06/2021, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
e1.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e1.bin.exe
Resource
win10v20210410
General
-
Target
e1.bin.exe
-
Size
128KB
-
MD5
d687eb9fea18e6836bd572b2d180b144
-
SHA1
0e7f076d59ab24ab04200415cb35037c619d0bae
-
SHA256
863e4557e550dd89e5ca0e43c57a3fc1889145c76ec9787e97f76e959fc8e1e1
-
SHA512
16aed099d7d1131facb76591176566a9de9a140948f467b7a43d7518215ce24490956b0996d0f7638cf0d313947f12d91d145ebe4d584779e119707d59463684
Malware Config
Extracted
C:\$Recycle.Bin\How to decrypt files.txt
http://eghv5cpdsmuj5e6tpyjk5icgq642hqubildf6yrfnqlq3rmsqk2zanid.onion/contact
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2628 bcdedit.exe 2964 bcdedit.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SubmitUnpublish.tiff => C:\Users\Admin\Pictures\SubmitUnpublish.tiff.tohnichi e1.bin.exe File renamed C:\Users\Admin\Pictures\SyncClear.tif => C:\Users\Admin\Pictures\SyncClear.tif.tohnichi e1.bin.exe File renamed C:\Users\Admin\Pictures\OutStep.png => C:\Users\Admin\Pictures\OutStep.png.tohnichi e1.bin.exe File opened for modification C:\Users\Admin\Pictures\SetUse.tiff e1.bin.exe File opened for modification C:\Users\Admin\Pictures\SubmitUnpublish.tiff e1.bin.exe File renamed C:\Users\Admin\Pictures\RenameJoin.tif => C:\Users\Admin\Pictures\RenameJoin.tif.tohnichi e1.bin.exe File opened for modification C:\Users\Admin\Pictures\EnableHide.tiff e1.bin.exe File renamed C:\Users\Admin\Pictures\EnableHide.tiff => C:\Users\Admin\Pictures\EnableHide.tiff.tohnichi e1.bin.exe File renamed C:\Users\Admin\Pictures\InitializeExit.crw => C:\Users\Admin\Pictures\InitializeExit.crw.tohnichi e1.bin.exe File renamed C:\Users\Admin\Pictures\SetUse.tiff => C:\Users\Admin\Pictures\SetUse.tiff.tohnichi e1.bin.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: e1.bin.exe File opened (read-only) \??\R: e1.bin.exe File opened (read-only) \??\S: e1.bin.exe File opened (read-only) \??\U: e1.bin.exe File opened (read-only) \??\X: e1.bin.exe File opened (read-only) \??\Z: e1.bin.exe File opened (read-only) \??\I: e1.bin.exe File opened (read-only) \??\L: e1.bin.exe File opened (read-only) \??\M: e1.bin.exe File opened (read-only) \??\O: e1.bin.exe File opened (read-only) \??\T: e1.bin.exe File opened (read-only) \??\W: e1.bin.exe File opened (read-only) \??\B: e1.bin.exe File opened (read-only) \??\E: e1.bin.exe File opened (read-only) \??\G: e1.bin.exe File opened (read-only) \??\N: e1.bin.exe File opened (read-only) \??\P: e1.bin.exe File opened (read-only) \??\Q: e1.bin.exe File opened (read-only) \??\V: e1.bin.exe File opened (read-only) \??\F: e1.bin.exe File opened (read-only) \??\H: e1.bin.exe File opened (read-only) \??\J: e1.bin.exe File opened (read-only) \??\K: e1.bin.exe File opened (read-only) \??\Y: e1.bin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-100.png e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\cs-cz\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL016.XML e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\sv-se\ui-strings.js e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\ui-strings.js e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ca-es\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-selector-api.jar e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\PREVIEW.GIF e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hu-hu\How to decrypt files.txt e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\How to decrypt files.txt e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ro-ro\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-lib-profiler.jar e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-pl.xrm-ms e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-pl.xrm-ms e1.bin.exe File created C:\Program Files\VideoLAN\VLC\locale\te\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\spectrum_spinner_process.svg e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nl-nl\How to decrypt files.txt e1.bin.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\How to decrypt files.txt e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-tw\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\rhp_world_icon_2x.png e1.bin.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\ConvertOpen.mp2v e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fi-fi\ui-strings.js e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\es-es\ui-strings.js e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\eu-es\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sa.jar e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\Close.png e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\css\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.identity_3.4.0.v20140827-1444.jar e1.bin.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\zh-TW\How to decrypt files.txt e1.bin.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pt-br\ui-strings.js e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_pt_BR.jar e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\tzdb.dat e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\THMBNAIL.PNG e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.core.contexts_1.3.100.v20140407-1019.jar e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core_0.10.100.v20140424-2042.jar e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-core-kit.xml e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\com-sun-tools-visualvm-modules-startup_ja.jar e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientPreview_eula.txt e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-80.png e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MinionPro-Bold.otf e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\home-selector.css e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremDemoR_BypassTrial365-ul-oob.xrm-ms e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\uk-ua\How to decrypt files.txt e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\manifest.xml e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\THMBNAIL.PNG e1.bin.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\How to decrypt files.txt e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ar-ae\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedback.gif e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-explorer.xml e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Constantia-Franklin Gothic Book.xml e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\ended_review_or_form.gif e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Updater.api e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ar-ae\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-140.png e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ul-phn.xrm-ms e1.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ul-phn.xrm-ms e1.bin.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\How to decrypt files.txt e1.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\bg_get.svg e1.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_pl.jar e1.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2188 vssadmin.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2188 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3172 e1.bin.exe 3172 e1.bin.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3172 e1.bin.exe Token: SeDebugPrivilege 3172 e1.bin.exe Token: SeBackupPrivilege 3580 vssvc.exe Token: SeRestorePrivilege 3580 vssvc.exe Token: SeAuditPrivilege 3580 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2188 3172 e1.bin.exe 75 PID 3172 wrote to memory of 2188 3172 e1.bin.exe 75 PID 3172 wrote to memory of 2400 3172 e1.bin.exe 77 PID 3172 wrote to memory of 2400 3172 e1.bin.exe 77 PID 3172 wrote to memory of 2460 3172 e1.bin.exe 78 PID 3172 wrote to memory of 2460 3172 e1.bin.exe 78 PID 2400 wrote to memory of 2628 2400 cmd.exe 82 PID 2400 wrote to memory of 2628 2400 cmd.exe 82 PID 2460 wrote to memory of 2964 2460 cmd.exe 84 PID 2460 wrote to memory of 2964 2460 cmd.exe 84 PID 3172 wrote to memory of 252 3172 e1.bin.exe 92 PID 3172 wrote to memory of 252 3172 e1.bin.exe 92 PID 252 wrote to memory of 2188 252 cmd.exe 94 PID 252 wrote to memory of 2188 252 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1.bin.exe"C:\Users\Admin\AppData\Local\Temp\e1.bin.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\System32\vssadmin.exe"C:\Windows\sysnative\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2188
-
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\e1.bin.exe" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:252 -
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2188
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3580