Resubmissions

29-10-2021 09:03

211029-kz7xysdac7 10

28-10-2021 13:28

211028-qq5dcsgdeq 10

23-10-2021 01:52

211023-cagepshab4 8

Analysis

  • max time kernel
    184s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    23-10-2021 01:52

General

  • Target

    steriok.exe

  • Size

    94KB

  • MD5

    b0c615c0a4f485b2030d6e1ab98375f0

  • SHA1

    de11e9d61e0a31dc19e8c5dd8fe06facf0ead052

  • SHA256

    eb2ed1680e9b2350d78f431849a9e8c5c1d91d97ae72767d228b2208e6f72f46

  • SHA512

    82342be7d388244b5b008134d6d351f669995caff94a9a532ce056130f1af54a20ec6f2b9a3ca78102200c53a73659d1043e5b213ce84642d225690a3a848024

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 26 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 6 IoCs
  • Drops file in Program Files directory 61 IoCs
  • Drops file in Windows directory 28 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\steriok.exe
    "C:\Users\Admin\AppData\Local\Temp\steriok.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:108
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:1068
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:1348
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:1844
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
          2⤵
            PID:1240
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config Dnscache start= auto
            2⤵
              PID:1344
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" config SQLTELEMETRY start= disabled
              2⤵
                PID:972
              • C:\Windows\SysWOW64\sc.exe
                "sc.exe" config FDResPub start= auto
                2⤵
                  PID:900
                • C:\Windows\SysWOW64\sc.exe
                  "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                  2⤵
                    PID:1460
                  • C:\Windows\SysWOW64\sc.exe
                    "sc.exe" config SQLWriter start= disabled
                    2⤵
                      PID:904
                    • C:\Windows\SysWOW64\sc.exe
                      "sc.exe" config SstpSvc start= disabled
                      2⤵
                        PID:2032
                      • C:\Windows\SysWOW64\sc.exe
                        "sc.exe" config SSDPSRV start= auto
                        2⤵
                          PID:1208
                        • C:\Windows\SysWOW64\sc.exe
                          "sc.exe" config upnphost start= auto
                          2⤵
                            PID:1696
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM synctime.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1620
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1132
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1740
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1144
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM Ntrtscan.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1408
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1828
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM firefoxconfig.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2040
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1956
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqbcoreservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1972
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM isqlplussvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:900
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM agntsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:920
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM steam.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1716
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlwriter.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:816
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM encsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1844
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM onenote.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:592
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM tbirdconfig.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1728
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM thebat.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:544
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM PccNTMon.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:980
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM excel.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1604
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM dbeng50.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1096
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocomm.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:328
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM CNTAoSMgr.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2024
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM thebat64.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1732
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM msaccess.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:792
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM infopath.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:288
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" IM thunderbird.exe /F
                            2⤵
                            • Kills process with taskkill
                            PID:1752
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mbamtray.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:908
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM outlook.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1944
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM tmlisten.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:592
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM dbsnmp.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:544
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM wordpad.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:992
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM zoolz.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1596
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM msftesql.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1996
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM xfssvccon.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1608
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM powerpnt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1760
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld-opt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1372
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocautoupds.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1592
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1508
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocssd.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1972
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM visio.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1424
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM oracle.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1928
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1644
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlagent.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1572
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM winword.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:940
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlbrowser.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1680
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld-nt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1740
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlservr.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1656
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1632
                          • C:\Windows\SysWOW64\notepad.exe
                            "C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
                            2⤵
                            • Opens file in notepad (likely ransom note)
                            PID:956
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                            2⤵
                              PID:1068
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 127.0.0.7 -n 3
                                3⤵
                                • Runs ping.exe
                                PID:1832
                              • C:\Windows\SysWOW64\fsutil.exe
                                fsutil file setZeroData offset=0 length=524288 “%s”
                                3⤵
                                  PID:1600
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\steriok.exe
                                2⤵
                                • Deletes itself
                                PID:460
                                • C:\Windows\SysWOW64\choice.exe
                                  choice /C Y /N /D Y /T 3
                                  3⤵
                                    PID:1688
                              • C:\Windows\explorer.exe
                                "C:\Windows\explorer.exe"
                                1⤵
                                  PID:1144
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x538
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1348
                                • C:\Windows\system32\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
                                  1⤵
                                  • Opens file in notepad (likely ransom note)
                                  PID:1372

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

                                  MD5

                                  9900dd1d8de9f62b81cfc45b84d73893

                                  SHA1

                                  ee9256b33dd065f8c6f4dc2a90789eedcce0e802

                                  SHA256

                                  c8150cf762da2bf1fbbeb2e89d64f78d855d42bc6a06be6507a687b065b85642

                                  SHA512

                                  eac2bb341130255916d9868f1ec8ba3b91f97d7cf0491bdc6d49bd22656f9b79e435a65e6d53101c0e3ffb651faba74e320187ebbeca05e1aab78418794f4eec

                                • memory/108-58-0x0000000000000000-mapping.dmp

                                • memory/288-95-0x0000000000000000-mapping.dmp

                                • memory/328-91-0x0000000000000000-mapping.dmp

                                • memory/544-100-0x0000000000000000-mapping.dmp

                                • memory/544-87-0x0000000000000000-mapping.dmp

                                • memory/592-99-0x0000000000000000-mapping.dmp

                                • memory/592-85-0x0000000000000000-mapping.dmp

                                • memory/792-94-0x0000000000000000-mapping.dmp

                                • memory/816-83-0x0000000000000000-mapping.dmp

                                • memory/900-80-0x0000000000000000-mapping.dmp

                                • memory/900-65-0x0000000000000000-mapping.dmp

                                • memory/904-67-0x0000000000000000-mapping.dmp

                                • memory/908-97-0x0000000000000000-mapping.dmp

                                • memory/920-81-0x0000000000000000-mapping.dmp

                                • memory/940-114-0x0000000000000000-mapping.dmp

                                • memory/956-125-0x0000000000000000-mapping.dmp

                                • memory/972-64-0x0000000000000000-mapping.dmp

                                • memory/980-88-0x0000000000000000-mapping.dmp

                                • memory/992-101-0x0000000000000000-mapping.dmp

                                • memory/1060-57-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1060-55-0x00000000008A0000-0x00000000008A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1068-59-0x0000000000000000-mapping.dmp

                                • memory/1068-126-0x0000000000000000-mapping.dmp

                                • memory/1096-90-0x0000000000000000-mapping.dmp

                                • memory/1132-72-0x0000000000000000-mapping.dmp

                                • memory/1144-74-0x0000000000000000-mapping.dmp

                                • memory/1144-122-0x000007FEFBA71000-0x000007FEFBA73000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1208-69-0x0000000000000000-mapping.dmp

                                • memory/1240-62-0x0000000000000000-mapping.dmp

                                • memory/1344-63-0x0000000000000000-mapping.dmp

                                • memory/1348-60-0x0000000000000000-mapping.dmp

                                • memory/1372-106-0x0000000000000000-mapping.dmp

                                • memory/1408-75-0x0000000000000000-mapping.dmp

                                • memory/1424-110-0x0000000000000000-mapping.dmp

                                • memory/1460-66-0x0000000000000000-mapping.dmp

                                • memory/1508-108-0x0000000000000000-mapping.dmp

                                • memory/1572-113-0x0000000000000000-mapping.dmp

                                • memory/1592-107-0x0000000000000000-mapping.dmp

                                • memory/1596-102-0x0000000000000000-mapping.dmp

                                • memory/1604-89-0x0000000000000000-mapping.dmp

                                • memory/1608-104-0x0000000000000000-mapping.dmp

                                • memory/1620-73-0x0000000000000000-mapping.dmp

                                • memory/1632-120-0x0000000002400000-0x000000000304A000-memory.dmp

                                  Filesize

                                  12.3MB

                                • memory/1632-118-0x0000000000000000-mapping.dmp

                                • memory/1632-119-0x0000000075821000-0x0000000075823000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1632-121-0x0000000002400000-0x000000000304A000-memory.dmp

                                  Filesize

                                  12.3MB

                                • memory/1644-112-0x0000000000000000-mapping.dmp

                                • memory/1656-117-0x0000000000000000-mapping.dmp

                                • memory/1680-115-0x0000000000000000-mapping.dmp

                                • memory/1696-70-0x0000000000000000-mapping.dmp

                                • memory/1716-82-0x0000000000000000-mapping.dmp

                                • memory/1728-86-0x0000000000000000-mapping.dmp

                                • memory/1732-93-0x0000000000000000-mapping.dmp

                                • memory/1740-116-0x0000000000000000-mapping.dmp

                                • memory/1740-71-0x0000000000000000-mapping.dmp

                                • memory/1752-96-0x0000000000000000-mapping.dmp

                                • memory/1760-105-0x0000000000000000-mapping.dmp

                                • memory/1828-76-0x0000000000000000-mapping.dmp

                                • memory/1832-128-0x0000000000000000-mapping.dmp

                                • memory/1844-61-0x0000000000000000-mapping.dmp

                                • memory/1844-84-0x0000000000000000-mapping.dmp

                                • memory/1928-111-0x0000000000000000-mapping.dmp

                                • memory/1944-98-0x0000000000000000-mapping.dmp

                                • memory/1956-78-0x0000000000000000-mapping.dmp

                                • memory/1972-109-0x0000000000000000-mapping.dmp

                                • memory/1972-79-0x0000000000000000-mapping.dmp

                                • memory/1996-103-0x0000000000000000-mapping.dmp

                                • memory/2024-92-0x0000000000000000-mapping.dmp

                                • memory/2032-68-0x0000000000000000-mapping.dmp

                                • memory/2040-77-0x0000000000000000-mapping.dmp