Analysis
-
max time kernel
149s -
max time network
177s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21/06/2021, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
sample.exe
-
Size
81KB
-
MD5
9c543a3b162b8e9317c717892ba47691
-
SHA1
52980b81ca21b6c02793272dea788f18c03c66bf
-
SHA256
d56cfe09f291b11e27b84ede219459ede65652a19596a0b33f8a3ef871236cf5
-
SHA512
502a5390c777c4c8f3848c66b7accc670b0ebbc7947253d8bb2c73e3b55097870f97142088d337c125d0e545a96ac3e06688c81a0f4935541439a7d58d918c04
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\temp\\mbr.exe" sample.exe -
Disables Task Manager via registry modification
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MountSwitch.raw => C:\Users\Admin\Pictures\MountSwitch.raw.SLAM sample.exe File renamed C:\Users\Admin\Pictures\PushRedo.png => C:\Users\Admin\Pictures\PushRedo.png.SLAM sample.exe File renamed C:\Users\Admin\Pictures\RegisterRead.png => C:\Users\Admin\Pictures\RegisterRead.png.SLAM sample.exe File renamed C:\Users\Admin\Pictures\ResizeComplete.crw => C:\Users\Admin\Pictures\ResizeComplete.crw.SLAM sample.exe File renamed C:\Users\Admin\Pictures\UninstallBlock.crw => C:\Users\Admin\Pictures\UninstallBlock.crw.SLAM sample.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sample.exe -
Drops desktop.ini file(s) 6 IoCs
description ioc Process File created C:\Users\Admin\Desktop\desktop.ini sample.exe File created C:\Users\Admin\Downloads\desktop.ini sample.exe File created C:\Users\Admin\Documents\desktop.ini sample.exe File created C:\Users\Admin\Pictures\desktop.ini sample.exe File created C:\Users\Admin\Music\desktop.ini sample.exe File created C:\Users\Admin\Videos\desktop.ini sample.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\Wallpaper = "C:\\temp\\backtrack.jpg" sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.SLAM rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.SLAM\ = "SLAM_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\SLAM_auto_file\shell\edit\command rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 744 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 800 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 800 AUDIODG.EXE Token: 33 800 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 800 AUDIODG.EXE Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe Token: SeDebugPrivilege 1120 sample.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe 1120 sample.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 920 wrote to memory of 744 920 rundll32.exe 32 PID 920 wrote to memory of 744 920 rundll32.exe 32 PID 920 wrote to memory of 744 920 rundll32.exe 32 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Modifies WinLogon for persistence
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- System policy modification
PID:1120
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5941⤵
- Suspicious use of AdjustPrivilegeToken
PID:800
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SubmitSend.contact.SLAM1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SubmitSend.contact.SLAM2⤵
- Opens file in notepad (likely ransom note)
PID:744
-