Analysis
-
max time kernel
151s -
max time network
87s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20/09/2021, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe
Resource
win10v20210408
General
-
Target
012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe
-
Size
268KB
-
MD5
7de8faec0ff116172850dc9d68351b2e
-
SHA1
44d42f6e247ed4cf5a5513b17e22e9e127e1c041
-
SHA256
012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be
-
SHA512
30d4326cffe580ad08657dc3ff5331d77e87682ee0c00aa785f6f90036ed7ca8771284fb0929c161b6271714ea5d6181660c725cce96747f66871071826c543c
Malware Config
Extracted
smokeloader
2020
http://venerynnet1.top/
http://kevonahira2.top/
http://vegangelist3.top/
http://kingriffaele4.top/
http://arakeishant5.top/
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker Payload 1 IoCs
resource yara_rule behavioral1/memory/2208-121-0x00007FF6F4C40000-0x00007FF6F54B8000-memory.dmp family_medusalocker -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2712 bcdedit.exe 3060 bcdedit.exe -
pid Process 3992 wbadmin.exe 3380 wbadmin.exe -
Drops file in Drivers directory 12 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 8894.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.udacha 8894.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 8894.exe File opened for modification C:\Windows\System32\drivers\etc\networks.udacha 8894.exe File opened for modification C:\Windows\System32\drivers\etc\services 8894.exe File opened for modification C:\Windows\System32\drivers\etc\services.udacha 8894.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 8894.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 8894.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 8894.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.udacha 8894.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 8894.exe File opened for modification C:\Windows\System32\drivers\etc\networks 8894.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 8894.exe -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SkipStop.raw.udacha 8894.exe File renamed C:\Users\Admin\Pictures\SelectExport.crw => C:\Users\Admin\Pictures\SelectExport.crw.inprocess 8894.exe File opened for modification C:\Users\Admin\Pictures\SelectExport.crw.inprocess 8894.exe File renamed C:\Users\Admin\Pictures\SelectExport.crw.inprocess => C:\Users\Admin\Pictures\SelectExport.crw.udacha 8894.exe File opened for modification C:\Users\Admin\Pictures\SelectExport.crw.udacha 8894.exe File renamed C:\Users\Admin\Pictures\SkipStop.raw => C:\Users\Admin\Pictures\SkipStop.raw.inprocess 8894.exe File opened for modification C:\Users\Admin\Pictures\SkipStop.raw.inprocess 8894.exe File renamed C:\Users\Admin\Pictures\SkipStop.raw.inprocess => C:\Users\Admin\Pictures\SkipStop.raw.udacha 8894.exe -
Deletes itself 1 IoCs
pid Process 3052 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 8894.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\8894.exe\" e" 8894.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-1594587808-2047097707-2163810515-1000\desktop.ini 8894.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\F: 8894.exe File opened (read-only) \??\H: 8894.exe File opened (read-only) \??\I: 8894.exe File opened (read-only) \??\K: 8894.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\W: 8894.exe File opened (read-only) \??\E: 8894.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\Y: 8894.exe File opened (read-only) \??\P: 8894.exe File opened (read-only) \??\V: 8894.exe File opened (read-only) \??\Z: 8894.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\M: 8894.exe File opened (read-only) \??\N: 8894.exe File opened (read-only) \??\T: 8894.exe File opened (read-only) \??\X: 8894.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\A: 8894.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\B: 8894.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\O: 8894.exe File opened (read-only) \??\S: 8894.exe File opened (read-only) \??\D: 8894.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\G: 8894.exe File opened (read-only) \??\J: 8894.exe File opened (read-only) \??\L: 8894.exe File opened (read-only) \??\Q: 8894.exe File opened (read-only) \??\R: 8894.exe File opened (read-only) \??\E: Process not Found File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\U: 8894.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\VSMIDK 8894.exe File opened for modification C:\Windows\System32\config\VSMIDK.udacha 8894.exe File opened for modification C:\Windows\System32\config\RegBack\SECURITY 8894.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.udacha 8894.exe File opened for modification C:\Windows\System32\config\COMPONENTS 8894.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor 8894.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.udacha 8894.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.udacha 8894.exe File opened for modification C:\Windows\System32\config\BCD-Template 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f55463bc-6f59-4e20-90ee-5964567988a3.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.inprocess 8894.exe File opened for modification C:\Windows\System32\config\COMPONENTS.udacha 8894.exe File opened for modification C:\Windows\System32\config\SYSTEM 8894.exe File opened for modification C:\Windows\System32\config\RegBack\SOFTWARE 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f55463bc-6f59-4e20-90ee-5964567988a3 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead.inprocess 8894.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent B73694AB7AFF02F8.udacha 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83.inprocess 8894.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent B73694AB7AFF02F8 8894.exe File opened for modification C:\Windows\System32\config\SECURITY 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\2adce956-0c74-47e9-8d83-3e951adefd07.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 8894.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.udacha 8894.exe File opened for modification C:\Windows\System32\config\VSMIDK.inprocess 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred 8894.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.udacha 8894.exe File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess 8894.exe File opened for modification C:\Windows\System32\config\RegBack\DEFAULT 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868 8894.exe File opened for modification C:\Windows\System32\config\SAM 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\2adce956-0c74-47e9-8d83-3e951adefd07 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\2adce956-0c74-47e9-8d83-3e951adefd07.inprocess 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC 8894.exe File opened for modification C:\Windows\System32\config\DRIVERS.udacha 8894.exe File opened for modification C:\Windows\System32\config\ELAM.udacha 8894.exe File opened for modification C:\Windows\System32\config\SOFTWARE 8894.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\62fea884-ba15-4897-9686-808a166505f3.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.udacha 8894.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83 8894.exe File opened for modification C:\Windows\System32\ResPriHMImageList 8894.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent B73694AB7AFF02F8.inprocess 8894.exe File opened for modification C:\Windows\System32\config\DRIVERS 8894.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1832 set thread context of 1840 1832 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 68 -
Drops file in Program Files directory 49 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 8894.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.udacha 8894.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 8894.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 8894.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 8894.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.udacha 8894.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess 8894.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess 8894.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 8894.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 8894.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.udacha 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 8894.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 8894.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 8894.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.udacha 8894.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.udacha 8894.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 8894.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.inprocess 8894.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_cc51e87d-bda7-4ef7-80cf-c431fec6b805.udacha 8894.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_cc51e87d-bda7-4ef7-80cf-c431fec6b805.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660}.udacha 8894.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.inprocess 8894.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_cc51e87d-bda7-4ef7-80cf-c431fec6b805 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.inprocess 8894.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr 8894.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD 8894.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6} 8894.exe File opened for modification C:\Windows\Panther\setupinfo.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97} 8894.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess 8894.exe File opened for modification C:\Windows\Boot\PCAT\bootnxt 8894.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.inprocess 8894.exe File opened for modification C:\Windows\Resources\Maps\mwconfig_client 8894.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.udacha 8894.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} 8894.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD 8894.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Panther\setupinfo 8894.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.udacha 8894.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F} 8894.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.inprocess 8894.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.inprocess 8894.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 8894.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe -
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2524 vssadmin.exe 3936 vssadmin.exe 512 vssadmin.exe 1412 vssadmin.exe 2172 vssadmin.exe 688 vssadmin.exe 3068 vssadmin.exe 3108 vssadmin.exe 2024 vssadmin.exe 3600 vssadmin.exe 932 vssadmin.exe 272 vssadmin.exe 1912 vssadmin.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1840 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 1840 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3052 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1840 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeBackupPrivilege 1248 vssvc.exe Token: SeRestorePrivilege 1248 vssvc.exe Token: SeAuditPrivilege 1248 vssvc.exe Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeIncreaseQuotaPrivilege 3836 wmic.exe Token: SeSecurityPrivilege 3836 wmic.exe Token: SeTakeOwnershipPrivilege 3836 wmic.exe Token: SeLoadDriverPrivilege 3836 wmic.exe Token: SeSystemProfilePrivilege 3836 wmic.exe Token: SeSystemtimePrivilege 3836 wmic.exe Token: SeProfSingleProcessPrivilege 3836 wmic.exe Token: SeIncBasePriorityPrivilege 3836 wmic.exe Token: SeCreatePagefilePrivilege 3836 wmic.exe Token: SeBackupPrivilege 3836 wmic.exe Token: SeRestorePrivilege 3836 wmic.exe Token: SeShutdownPrivilege 3836 wmic.exe Token: SeDebugPrivilege 3836 wmic.exe Token: SeSystemEnvironmentPrivilege 3836 wmic.exe Token: SeRemoteShutdownPrivilege 3836 wmic.exe Token: SeUndockPrivilege 3836 wmic.exe Token: SeManageVolumePrivilege 3836 wmic.exe Token: 33 3836 wmic.exe Token: 34 3836 wmic.exe Token: 35 3836 wmic.exe Token: 36 3836 wmic.exe Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found Token: SeShutdownPrivilege 3052 Process not Found Token: SeCreatePagefilePrivilege 3052 Process not Found -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found 3052 Process not Found -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3052 Process not Found -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1840 1832 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 68 PID 1832 wrote to memory of 1840 1832 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 68 PID 1832 wrote to memory of 1840 1832 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 68 PID 1832 wrote to memory of 1840 1832 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 68 PID 1832 wrote to memory of 1840 1832 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 68 PID 1832 wrote to memory of 1840 1832 012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe 68 PID 3052 wrote to memory of 2208 3052 Process not Found 69 PID 3052 wrote to memory of 2208 3052 Process not Found 69 PID 2208 wrote to memory of 688 2208 8894.exe 71 PID 2208 wrote to memory of 688 2208 8894.exe 71 PID 2208 wrote to memory of 1912 2208 8894.exe 75 PID 2208 wrote to memory of 1912 2208 8894.exe 75 PID 2208 wrote to memory of 2524 2208 8894.exe 77 PID 2208 wrote to memory of 2524 2208 8894.exe 77 PID 2208 wrote to memory of 3068 2208 8894.exe 79 PID 2208 wrote to memory of 3068 2208 8894.exe 79 PID 2208 wrote to memory of 3936 2208 8894.exe 81 PID 2208 wrote to memory of 3936 2208 8894.exe 81 PID 2208 wrote to memory of 3108 2208 8894.exe 83 PID 2208 wrote to memory of 3108 2208 8894.exe 83 PID 2208 wrote to memory of 2024 2208 8894.exe 85 PID 2208 wrote to memory of 2024 2208 8894.exe 85 PID 2208 wrote to memory of 512 2208 8894.exe 87 PID 2208 wrote to memory of 512 2208 8894.exe 87 PID 2208 wrote to memory of 3600 2208 8894.exe 89 PID 2208 wrote to memory of 3600 2208 8894.exe 89 PID 2208 wrote to memory of 1412 2208 8894.exe 91 PID 2208 wrote to memory of 1412 2208 8894.exe 91 PID 2208 wrote to memory of 932 2208 8894.exe 93 PID 2208 wrote to memory of 932 2208 8894.exe 93 PID 2208 wrote to memory of 272 2208 8894.exe 95 PID 2208 wrote to memory of 272 2208 8894.exe 95 PID 2208 wrote to memory of 2172 2208 8894.exe 97 PID 2208 wrote to memory of 2172 2208 8894.exe 97 PID 2208 wrote to memory of 2712 2208 8894.exe 99 PID 2208 wrote to memory of 2712 2208 8894.exe 99 PID 2208 wrote to memory of 3060 2208 8894.exe 101 PID 2208 wrote to memory of 3060 2208 8894.exe 101 PID 2208 wrote to memory of 3992 2208 8894.exe 103 PID 2208 wrote to memory of 3992 2208 8894.exe 103 PID 2208 wrote to memory of 3380 2208 8894.exe 105 PID 2208 wrote to memory of 3380 2208 8894.exe 105 PID 2208 wrote to memory of 3836 2208 8894.exe 107 PID 2208 wrote to memory of 3836 2208 8894.exe 107 PID 2208 wrote to memory of 3992 2208 8894.exe 114 PID 2208 wrote to memory of 3992 2208 8894.exe 114 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 8894.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe"C:\Users\Admin\AppData\Local\Temp\012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe"C:\Users\Admin\AppData\Local\Temp\012c15dcf9fc98fb63f83d2fac91b9cbe4abb471d520c9bb9702e82993cc23be.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\8894.exeC:\Users\Admin\AppData\Local\Temp\8894.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2208 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:688
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:1912
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2524
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3068
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3936
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3108
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2024
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:512
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3600
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1412
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:932
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:272
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2172
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:2712
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3060
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:3992
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:3380
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8894.exe >> NUL2⤵PID:3992
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248