Analysis
-
max time kernel
1017s -
max time network
736s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-08-2021 11:13
Static task
static1
Behavioral task
behavioral1
Sample
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe
Resource
win10v20210410
General
-
Target
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe
-
Size
122KB
-
MD5
8a7deb28bf1fc0925142ef2f9bac9883
-
SHA1
6e9d34c13f303ba3f4e5edec702383e3b293432a
-
SHA256
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd
-
SHA512
3f9298131593033c439d99107290461370c675925213f39ba9ffffc626b9cad6e6e4f6efcd4c1d4761eddb7796fa6e36e1a519617176d53d10e551452ef00dea
Malware Config
Extracted
C:\j953co8562-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/60FB08DA683F01C9
http://decoder.re/60FB08DA683F01C9
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies Installed Components in the registry 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exedescription ioc process File renamed C:\Users\Admin\Pictures\DisableMerge.png => \??\c:\users\admin\pictures\DisableMerge.png.j953co8562 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File renamed C:\Users\Admin\Pictures\ImportDismount.crw => \??\c:\users\admin\pictures\ImportDismount.crw.j953co8562 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File renamed C:\Users\Admin\Pictures\ReceiveUnregister.crw => \??\c:\users\admin\pictures\ReceiveUnregister.crw.j953co8562 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe -
Drops startup file 5 IoCs
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\tmp c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\j953co8562-readme.txt c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\tmp c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\j953co8562-readme.txt c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\t32mMaunsR = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe" c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exedescription ioc process File opened for modification \??\c:\users\public\desktop\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\public\documents\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\public\music\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\pictures\camera roll\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\libraries\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files (x86)\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\local\microsoft\windows\winx\group2\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\public\pictures\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\local\microsoft\windows\winx\group1\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\local\microsoft\windows\winx\group3\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\unc\rjmqbvdn\c\$recycle.bin\s-1-5-21-3686645723-710336880-414668232-1000\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\sendto\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\winx\group2\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\links\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\searches\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\maintenance\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\sendto\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\burn\burn\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\windows powershell\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessibility\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\system tools\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\windows powershell\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\documents\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu places\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessories\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\public\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\onedrive\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\internet explorer\quick launch\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\winx\group1\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\$recycle.bin\s-1-5-21-3686645723-710336880-414668232-1000\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\public\videos\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\history\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\recent\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessories\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\public\accountpictures\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\public\libraries\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\pictures\saved pictures\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessibility\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\accessibility\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\administrative tools\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\unc\rjmqbvdn\c\windows\media\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\music\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\accountpictures\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\internet explorer\quick launch\user pinned\taskbar\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\maintenance\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\videos\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\startup\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\internet explorer\quick launch\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\winx\group3\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\system tools\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\system tools\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\maintenance\Desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exedescription ioc process File opened (read-only) \??\G: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\H: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\L: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\N: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\O: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\T: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\J: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\W: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\R: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\A: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\F: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\I: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\K: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\M: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\P: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\Q: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\V: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\X: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\Y: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\B: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\E: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\S: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\U: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\Z: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened (read-only) \??\D: c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in Program Files directory 24 IoCs
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exedescription ioc process File opened for modification \??\c:\program files\SyncStop.avi c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File created \??\c:\program files\tmp c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\EnableCheckpoint.bat c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\ExpandRedo.scf c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\GroupTest.hta c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\HideSync.wmf c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\ReadFind.xlt c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File created \??\c:\program files\j953co8562-readme.txt c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File created \??\c:\program files (x86)\j953co8562-readme.txt c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\ApproveSelect.mpv2 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\ConvertToSkip.odp c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\JoinConvertTo.html c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\SwitchOpen.lnk c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File created \??\c:\program files (x86)\tmp c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\ReadResume.pot c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\SelectNew.vbs c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\UnblockRevoke.xla c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\FindUninstall.bat c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\RenameMount.asf c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\ResumeBlock.wmf c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\SearchUndo.midi c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files\UninstallRequest.docx c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe File opened for modification \??\c:\program files (x86)\desktop.ini c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2496 2492 WerFault.exe 264 2128 WerFault.exe explorer.exe 2600 1072 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exeWerFault.exeWerFault.exepid process 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exevssvc.exeWerFault.exeexplorer.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe Token: SeTakeOwnershipPrivilege 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe Token: SeBackupPrivilege 3728 vssvc.exe Token: SeRestorePrivilege 3728 vssvc.exe Token: SeAuditPrivilege 3728 vssvc.exe Token: SeDebugPrivilege 2496 WerFault.exe Token: SeShutdownPrivilege 2128 explorer.exe Token: SeCreatePagefilePrivilege 2128 explorer.exe Token: SeShutdownPrivilege 2128 explorer.exe Token: SeCreatePagefilePrivilege 2128 explorer.exe Token: SeShutdownPrivilege 2128 explorer.exe Token: SeCreatePagefilePrivilege 2128 explorer.exe Token: SeShutdownPrivilege 2128 explorer.exe Token: SeCreatePagefilePrivilege 2128 explorer.exe Token: SeDebugPrivilege 264 WerFault.exe Token: SeShutdownPrivilege 2128 explorer.exe Token: SeCreatePagefilePrivilege 2128 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
explorer.exepid process 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
explorer.exepid process 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe 2128 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exedescription pid process target process PID 3412 wrote to memory of 2620 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe netsh.exe PID 3412 wrote to memory of 2620 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe netsh.exe PID 3412 wrote to memory of 2620 3412 c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\c55646354dd7d92f9b3252c8b817baf22157610d9491dc7d0f299dad64d8eacd.bin.sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes2⤵PID:2620
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3936
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2492 -s 11241⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2128 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2128 -s 20882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:264
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1072 -s 7001⤵
- Program crash
PID:2600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3686645723-710336880-414668232-1000\desktop.iniMD5
3e332cf769b55f7ddd344ba5c0eadb3e
SHA131df5840d2d886d74226bb2f9b9736bc544960e7
SHA2562188b519aabe9334551acd977726c0d544dce91d32d1261856d46427849401a5
SHA512f1be14455d0e92c5f67f436926bf2dc72d974ea511b5e5d62bdbda72ff4a4436671e9aa6a89c7d035f2dce859d5d4c29ed1f316ed3b8180d90155c906875a01e
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.j953co8562MD5
f4a99eba9d300a8ddcf5e219e346a5d9
SHA165ca71d517e55c96513097b44dbe2efbf2121e15
SHA256f0ee0afe3894cef59c7fd8383da9120ce435e64baacac263ad4ea83fe664260a
SHA512cdb4da825a77535a60396a73b9ac80d3ba7ec9de27677b1f6d9c7ae444d5a175daa0dcfc7aa086d7c84850f64379e987f1eab7cfdaa32d8428fb3c5d6e9fa454
-
memory/2620-114-0x0000000000000000-mapping.dmp