Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe
Resource
win10v20210410
General
-
Target
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe
-
Size
116KB
-
MD5
63241a7a39692f90328a72c0e9826afd
-
SHA1
016ef5b9e91eb9a90af39dbb2c66fe527de12f92
-
SHA256
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c
-
SHA512
6a758b525c665c45770b18d84f2cb8a38b45d8093558bf15f5e7f53283c0352bd9afd54cfdac21e3deaf146fb840ba5ba32b9da765902f36ef7aa126cc8287c1
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_A3ED31EC.txt
ragnarlocker
http://p6o7m73ujalhgkiv.onion/?p=171
http://mykgoj7uvqtgl367.onion/client/?6bECA2b2AFFfBC1Dff0aa0EaaAd468bec0903b5e4Ea58ecde3C264bC55c7389E
http://p6o7m73ujalhgkiv.onion/?page_id=171
Signatures
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\ConvertConnect.tiff 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File renamed C:\Users\Admin\Pictures\ConvertConnect.tiff => C:\Users\Admin\Pictures\ConvertConnect.tiff.ragnar_A3ED31EC 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File renamed C:\Users\Admin\Pictures\FormatRemove.png => C:\Users\Admin\Pictures\FormatRemove.png.ragnar_A3ED31EC 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe -
Drops startup file 1 IoCs
Processes:
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exedescription ioc process File opened (read-only) \??\E: 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe -
Drops file in Program Files directory 64 IoCs
Processes:
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.repository.nl_ja_4.4.0.v20140623020002.jar 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\AppxManifest.xml 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-72_altform-colorize.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription2-ul-oob.xrm-ms 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.DailyChallenges\Assets\Tab\TabTiles.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\qa_60x42.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-63.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\ui-strings.js 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\file_icons.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\en-US\msdaprsr.dll.mui 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\ECLIPSE_.SF 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\host.luac 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\TimerMedTile.contrast-black_scale-100.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\MapsLargeTile.scale-125.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription4-pl.xrm-ms 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\LTSHYPH_ES.LEX 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailSmallTile.scale-200.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\7656_32x32x32.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\Office365LogoWLockup.scale-180.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsWideTile.scale-200.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-16_altform-unplated_contrast-white.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-36_altform-unplated_contrast-white.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-48.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\Assets\Fonts\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-72_altform-unplated.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\LargeTile.scale-200.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sk-sk\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RADIAL\RADIAL.INF 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\RGNR_A3ED31EC.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookMedTile.scale-150.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_25.25.13009.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarSmallTile.scale-150.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\WideTile.scale-125.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-48_altform-unplated.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hu-hu\ui-strings.js 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\resources.jar 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\artifacts.xml 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_1.1702.21039.0_x64__8wekyb3d8bbwe\Assets\Images\Tiles\Square71x71Logo.scale-200.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\MedTile.scale-200.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.ui.nl_ja_4.4.0.v20140623020002.jar 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\challenge\Diamonds_are_Forever_Unearned_small.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\hn_16x11.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ro-ro\ui-strings.js 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Dark.scale-125.png 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\nl_get.svg 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\PROOF\MSWDS_FR.LEX 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_ellipses-hover.svg 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fi-fi\PlayStore_icon.svg 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\Be.Tests.ps1 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.VBS 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_KMS_Client-ul.xrm-ms 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\svgCheckboxUnselected.svg 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3776 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 3136 notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exepid process 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
wmic.exevssvc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1096 wmic.exe Token: SeSecurityPrivilege 1096 wmic.exe Token: SeTakeOwnershipPrivilege 1096 wmic.exe Token: SeLoadDriverPrivilege 1096 wmic.exe Token: SeSystemProfilePrivilege 1096 wmic.exe Token: SeSystemtimePrivilege 1096 wmic.exe Token: SeProfSingleProcessPrivilege 1096 wmic.exe Token: SeIncBasePriorityPrivilege 1096 wmic.exe Token: SeCreatePagefilePrivilege 1096 wmic.exe Token: SeBackupPrivilege 1096 wmic.exe Token: SeRestorePrivilege 1096 wmic.exe Token: SeShutdownPrivilege 1096 wmic.exe Token: SeDebugPrivilege 1096 wmic.exe Token: SeSystemEnvironmentPrivilege 1096 wmic.exe Token: SeRemoteShutdownPrivilege 1096 wmic.exe Token: SeUndockPrivilege 1096 wmic.exe Token: SeManageVolumePrivilege 1096 wmic.exe Token: 33 1096 wmic.exe Token: 34 1096 wmic.exe Token: 35 1096 wmic.exe Token: 36 1096 wmic.exe Token: SeBackupPrivilege 3864 vssvc.exe Token: SeRestorePrivilege 3864 vssvc.exe Token: SeAuditPrivilege 3864 vssvc.exe Token: SeIncreaseQuotaPrivilege 1096 wmic.exe Token: SeSecurityPrivilege 1096 wmic.exe Token: SeTakeOwnershipPrivilege 1096 wmic.exe Token: SeLoadDriverPrivilege 1096 wmic.exe Token: SeSystemProfilePrivilege 1096 wmic.exe Token: SeSystemtimePrivilege 1096 wmic.exe Token: SeProfSingleProcessPrivilege 1096 wmic.exe Token: SeIncBasePriorityPrivilege 1096 wmic.exe Token: SeCreatePagefilePrivilege 1096 wmic.exe Token: SeBackupPrivilege 1096 wmic.exe Token: SeRestorePrivilege 1096 wmic.exe Token: SeShutdownPrivilege 1096 wmic.exe Token: SeDebugPrivilege 1096 wmic.exe Token: SeSystemEnvironmentPrivilege 1096 wmic.exe Token: SeRemoteShutdownPrivilege 1096 wmic.exe Token: SeUndockPrivilege 1096 wmic.exe Token: SeManageVolumePrivilege 1096 wmic.exe Token: 33 1096 wmic.exe Token: 34 1096 wmic.exe Token: 35 1096 wmic.exe Token: 36 1096 wmic.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exedescription pid process target process PID 3728 wrote to memory of 1096 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe wmic.exe PID 3728 wrote to memory of 1096 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe wmic.exe PID 3728 wrote to memory of 3776 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe vssadmin.exe PID 3728 wrote to memory of 3776 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe vssadmin.exe PID 3728 wrote to memory of 3136 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe notepad.exe PID 3728 wrote to memory of 3136 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe notepad.exe PID 3728 wrote to memory of 3136 3728 30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe"C:\Users\Admin\AppData\Local\Temp\30dcc7a8ae98e52ee5547379048ca1fc90925e09a2a81c055021ba225c1d064c.sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3776
-
-
C:\Windows\SysWOW64\notepad.exeC:\Users\Public\Documents\RGNR_A3ED31EC.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3136
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ebb1e76a32908e6653c933364985f639
SHA169fc0b1ed4cd4548bb4ebbe3d9f2bf7934735ff7
SHA2561c6ab30444efec425084c396107d7f66371bfc526f6f11480263de22a8233c8f
SHA512e35ebebb5c69e26127be6246ca44d8819cc19cbb7fa9eaa861367b414605eb71b66e440fd5bfa404ab950730053e87d5c7daf0bbab7296ee8bd724c81f730abe