Analysis
-
max time kernel
154s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en -
submitted
10-09-2021 11:25
Static task
static1
Behavioral task
behavioral1
Sample
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe
Resource
win10-en
General
-
Target
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe
-
Size
143KB
-
MD5
a3749c66f65d247d8a6fae1be26d3ef9
-
SHA1
c394464bba56e62ddfe2c9073932fb656fb78b6c
-
SHA256
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c
-
SHA512
65bc1dba7e4de098e6b27b13b1e0723f703f645e4a4c6e53b7b03ec096a70d48ec2aca7e8bcd911ced61bab35e95983510604421ef35a593278414bfbb1cb01c
Malware Config
Extracted
C:\vcd6o07up-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C4EB14614DCB2578
http://decryptor.top/C4EB14614DCB2578
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exedescription ioc process File opened for modification \??\c:\users\admin\pictures\ResizeOptimize.tiff d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File renamed C:\Users\Admin\Pictures\ResizeOptimize.tiff => \??\c:\users\admin\pictures\ResizeOptimize.tiff.vcd6o07up d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exedescription ioc process File opened (read-only) \??\Y: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\E: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\F: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\I: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\M: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\Q: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\U: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\X: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\G: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\H: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\N: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\T: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\V: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\W: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\A: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\K: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\L: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\S: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\Z: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\D: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\B: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\J: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\O: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\P: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened (read-only) \??\R: d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\s64ofe9c9k8.bmp" d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe -
Drops file in Program Files directory 25 IoCs
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exedescription ioc process File created \??\c:\program files\vcd6o07up-readme.txt d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File created \??\c:\program files\d60dff40.lock d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File created \??\c:\program files (x86)\d60dff40.lock d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\OutInvoke.odt d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\ResolveImport.pps d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\StopRedo.WTV d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\SwitchStep.vstm d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File created \??\c:\program files (x86)\vcd6o07up-readme.txt d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\BackupUnblock.vsdm d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\CompareInvoke.midi d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\CopySelect.pub d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\DisableLock.fon d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\DisableSuspend.vbe d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\ExpandUnpublish.jpe d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\GroupDeny.m4a d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\InvokeExit.midi d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\RestartFind.wmf d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\StartHide.ttc d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\StopTest.rar d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\CloseRedo.css d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\EnterRestore.ttc d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\SaveResume.midi d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\FormatSet.vssm d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\HideOptimize.gif d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification \??\c:\program files\MeasureGet.emf d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe -
Drops file in Windows directory 64 IoCs
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exedescription ioc process File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-msxml60_31bf3856ad364e35_10.0.15063.0_none_a3d67fce0405ea82.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..opwindowmanager-api_31bf3856ad364e35_10.0.15063.0_none_f122bdc678cc145c_dwmapi.dll_2f4f8b34 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..ontroller.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_1d93f33351bcef30_services.exe.mui_86ea5e71 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_uk-ua_83b5c737a2b4f712_comctl32.dll.mui_0da4e682 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-drv.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_015afb5db18ed1e5_mpsdrv.sys.mui_b2aea3b6 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-drv.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_8da870b17bdbc93e_mpsdrv.sys.mui_b2aea3b6 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_windows-defender-drivers_31bf3856ad364e35_10.0.15063.0_none_01e0e8792e07e99a_wdboot.sys_9bae05d2 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-etw-ese_31bf3856ad364e35_10.0.15063.0_none_eac35629f38bb48f_etweseproviderresources.dll_f21e8ea7 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_bg-bg_a18c0c1f4d396f4e_bootmgfw.efi.mui_a6e78cfa d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_da-dk_e9cf62e131074778_bootmgr.efi.mui_be5d0075 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_fr-ca_2ae4eb43198d1604.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-imm32_31bf3856ad364e35_10.0.15063.0_none_6d69f74fb339b66a_imm32.dll_53c2ab30 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-shacct-profile_31bf3856ad364e35_10.0.15063.0_none_bb57d0370769d62e_shacctprofile.dll_c91e31f3 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-twinapi_31bf3856ad364e35_10.0.15063.0_none_d6c5b2afd3cdeb43.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_b8262e91837e8313_listsvc.dll.mui_27f0fc85 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-bcrypt-dll_31bf3856ad364e35_10.0.15063.0_none_09f516f85c9523f2_bcrypt.dll_e2f091ac d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_380c6a168cb58b34.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_10.0.15063.0_de-de_7a7bbe6b4471ea21.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..opactivitymoderator_31bf3856ad364e35_10.0.15063.0_none_1afe75a2a51438fe_bamsettingsclient.dll_db7ec840 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..oexistencemigration_31bf3856ad364e35_10.0.15063.0_none_22f6ec0bb529250e_httpprxc.dll_53471021 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-n..-domain-clients-svc_31bf3856ad364e35_10.0.15063.0_none_5522510b24d3f7d4_ipsecsvc.mof_713662d2 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-p..ng-client-overrides_31bf3856ad364e35_10.0.15063.0_none_2aad78202bd046dc.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rpc-kernel_31bf3856ad364e35_10.0.15063.0_none_d0205d0ebab54d57.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-gdi32full_31bf3856ad364e35_10.0.15063.0_none_7153f6fb947272a7.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-gdi32_31bf3856ad364e35_10.0.15063.0_none_74e72d87b68106ce.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-i..r_service.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_967b0826e973a912.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-w..r-webclnt.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_96e305274408a6c1.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.15063.0_none_946aa6202fade3c5_vgasys.fon_5d8bebb4 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lua.resources_31bf3856ad364e35_10.0.15063.0_de-de_56adcd42b63fc078_appinfo.dll.mui_cfd93456 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_e1f4fde2e2936fd2_vdsutil.dll.mui_0caf9b0e d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-winsock-core.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_8bcce1cb747b53af.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_ru-ru_1b72f2a049408d5f.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-rasauto-mui.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_aaf722a283f6bf8c_rasautou.exe.mui_55686a97 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-coresystemminpnp_31bf3856ad364e35_10.0.15063.0_none_1b70ea73251f149e.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasrtutils_31bf3856ad364e35_10.0.15063.0_none_1e296d4a23494905_rtutils.dll_243724ab d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.15063.0_none_f30c8be8f4be0687_kerbclientshared.dll_1fa7b356 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_10.0.15063.0_none_4921bb9511ea287a_scecli.dll_149e0f7b d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-twinapi-appcore_31bf3856ad364e35_10.0.15063.0_none_c4afd53ef6b024d5_twinapi.appcore.dll_8d6512dc d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.15063.0_es-mx_289be2d20b46e0d6.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_hid-user.resources_31bf3856ad364e35_10.0.15063.0_en-us_76b6693524012765.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-cryptbase_31bf3856ad364e35_10.0.15063.0_none_7679aeb1e6c8b09d_cryptbase.dll_83e36053 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_3dfe9dfd48e10842_scarddlg.dll.mui_300ae9df d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.15063.0_sl-si_55950d3867c13540_comctl32.dll.mui_0da4e682 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lua_31bf3856ad364e35_10.0.15063.0_none_b75e366b959a24e0_consent.exe_9075a1c2 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ucrt_31bf3856ad364e35_10.0.15063.0_none_bcd50e80524ea2f0.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-drv_31bf3856ad364e35_10.0.15063.0_none_b38673e5fb4dea69.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_0b6d675d9b5baa75_gpsvc.dll.mui_0c160ac2 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..-netlogon.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_edaedb587ef8ad3a_netlogon.dll.mui_ecbeb9bd d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_es-es_a1252bdb893ce37e.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.15063.0_ro-ro_b4ff9b4773926d63.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-axinstallservice_31bf3856ad364e35_10.0.15063.0_none_e819281ea9bc03bf_axinstsv.dll_ebc2b91e d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..ermodepnp.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_9f1f19283dd496cd_drvinst.exe.mui_e88f4c73 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..vices-sam.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_54645fdf358c2fb5.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_10.0.15063.0_none_2583321dfa2b45c4.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-n..-domain-clients-svc_31bf3856ad364e35_10.0.15063.0_none_5522510b24d3f7d4_winipsec.mof_abfff45a d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.15063.0_none_108e4f62dfe5d999.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase_31bf3856ad364e35_10.0.15063.0_none_1ef4411ab33dfe81_rasctrnm.h_17610c72 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_fi-fi_735d69029ba32696_bootmgr.exe.mui_c434701f d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-tcpip.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_b007ff450adb462f_netiougc.exe.mui_ad7a9e4d d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_ja-jp_d02a172e465bf139.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.15063.0_zh-tw_d1c976e3059aeb0e_comctl32.dll.mui_0da4e682 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-keyiso.resources_31bf3856ad364e35_10.0.15063.0_en-us_25f384cce1402e82.manifest d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-etw-ese_31bf3856ad364e35_10.0.15063.0_none_e06eabd7bf2af294_etweseproviderresources.dll_f21e8ea7 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-dui70_31bf3856ad364e35_10.0.15063.0_none_68c8890a36e9805f_dui70.dll_5f097b0b d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4764 vssadmin.exe -
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C\Blob = 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 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\SystemCertificates\CA\Certificates\33E4E80807204C2B6182A3A14B591ACD25B5F0DB d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe Set value (data) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\SystemCertificates\CA\Certificates\33E4E80807204C2B6182A3A14B591ACD25B5F0DB\Blob = 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 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exepid process 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4800 vssvc.exe Token: SeRestorePrivilege 4800 vssvc.exe Token: SeAuditPrivilege 4800 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.execmd.exedescription pid process target process PID 4640 wrote to memory of 4720 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe cmd.exe PID 4640 wrote to memory of 4720 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe cmd.exe PID 4640 wrote to memory of 4720 4640 d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe cmd.exe PID 4720 wrote to memory of 4764 4720 cmd.exe vssadmin.exe PID 4720 wrote to memory of 4764 4720 cmd.exe vssadmin.exe PID 4720 wrote to memory of 4764 4720 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c.bin.sample.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4640-116-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/4640-117-0x0000000002640000-0x0000000002641000-memory.dmpFilesize
4KB
-
memory/4640-118-0x0000000002690000-0x0000000002691000-memory.dmpFilesize
4KB
-
memory/4640-115-0x0000000000FD0000-0x0000000000FDA000-memory.dmpFilesize
40KB
-
memory/4640-119-0x00000000026A0000-0x00000000026A6000-memory.dmpFilesize
24KB
-
memory/4720-120-0x0000000000000000-mapping.dmp
-
memory/4764-121-0x0000000000000000-mapping.dmp