Resubmissions
21/09/2022, 15:35
220921-s1bj5scbfr 918/06/2021, 06:44
210618-hbnfahrlfa 1018/06/2021, 06:16
210618-zl79572kwa 10Analysis
-
max time kernel
31s -
max time network
42s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
18/06/2021, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
Windows Session Manager.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Windows Session Manager.exe
Resource
win10v20210410
General
-
Target
Windows Session Manager.exe
-
Size
278KB
-
MD5
6736b48ac9b71f21d8e41d5a1f27a0a6
-
SHA1
45eb63e779cb9f33209b29a175199a9048bd9035
-
SHA256
5ad38d579fb249b3326a25cffb6f5ffea11b125cda7b61205893432f59a02101
-
SHA512
c009278cd156d72957b5a29cec68eb97a0aad8dba7dc3c7a3bb1bba2c96779c41a89a106d65dcb91880fb5e2a639c1b89c87ba3906dd11f4aa7f76fe1f5de8ad
Malware Config
Extracted
C:\readme.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CopyUnregister.tiff.Poteston Windows Session Manager.exe File opened for modification C:\Users\Admin\Pictures\InvokeBackup.png.Poteston Windows Session Manager.exe File opened for modification C:\Users\Admin\Pictures\OpenMove.tif.Poteston Windows Session Manager.exe File opened for modification C:\Users\Admin\Pictures\PublishComplete.raw.Poteston Windows Session Manager.exe File opened for modification C:\Users\Admin\Pictures\TestUnregister.crw.Poteston Windows Session Manager.exe File opened for modification C:\Users\Admin\Pictures\UseReset.tif.Poteston Windows Session Manager.exe File opened for modification C:\Users\Admin\Pictures\ConfirmOut.tiff.Poteston Windows Session Manager.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Session Manager.exe Windows Session Manager.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 692 vssadmin.exe 1804 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 436 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 1620 vssvc.exe Token: SeRestorePrivilege 1620 vssvc.exe Token: SeAuditPrivilege 1620 vssvc.exe Token: 33 2044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2044 AUDIODG.EXE Token: 33 2044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2044 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 756 wrote to memory of 744 756 Windows Session Manager.exe 30 PID 756 wrote to memory of 744 756 Windows Session Manager.exe 30 PID 756 wrote to memory of 744 756 Windows Session Manager.exe 30 PID 756 wrote to memory of 744 756 Windows Session Manager.exe 30 PID 744 wrote to memory of 692 744 cmd.exe 32 PID 744 wrote to memory of 692 744 cmd.exe 32 PID 744 wrote to memory of 692 744 cmd.exe 32 PID 744 wrote to memory of 692 744 cmd.exe 32 PID 756 wrote to memory of 1588 756 Windows Session Manager.exe 33 PID 756 wrote to memory of 1588 756 Windows Session Manager.exe 33 PID 756 wrote to memory of 1588 756 Windows Session Manager.exe 33 PID 756 wrote to memory of 1588 756 Windows Session Manager.exe 33 PID 1588 wrote to memory of 1804 1588 cmd.exe 36 PID 1588 wrote to memory of 1804 1588 cmd.exe 36 PID 1588 wrote to memory of 1804 1588 cmd.exe 36 PID 1588 wrote to memory of 1804 1588 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows Session Manager.exe"C:\Users\Admin\AppData\Local\Temp\Windows Session Manager.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1804
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1336
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:436