Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
29-11-2021 11:29
Static task
static1
Behavioral task
behavioral1
Sample
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe
Resource
win10-en-20211104
General
-
Target
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe
-
Size
56KB
-
MD5
af2cac864d51827a760560a2d1df8fe8
-
SHA1
651f6e8aeb91cf84eb809a3d0fdcf67ba80c8339
-
SHA256
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7
-
SHA512
dbc929410cf09408086cdff6b5e03e143568296084929c19eefc045e5228676cbd40e6daaf3a39463c69ec87c1ca099f2f50dc92351cb802f3aa1642be205b86
Malware Config
Extracted
\??\c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RecoveryManual.html
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exedescription ioc process File renamed C:\Users\Admin\Pictures\DismountSkip.raw => \??\c:\Users\Admin\Pictures\DismountSkip.raw.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\ShowSearch.crw => \??\c:\Users\Admin\Pictures\ShowSearch.crw.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\CheckpointUnpublish.png => \??\c:\Users\Admin\Pictures\CheckpointUnpublish.png.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\ImportExit.crw => \??\c:\Users\Admin\Pictures\ImportExit.crw.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\InitializeAssert.png => \??\c:\Users\Admin\Pictures\InitializeAssert.png.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\InstallRegister.tif => \??\c:\Users\Admin\Pictures\InstallRegister.tif.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\RenameMerge.crw => \??\c:\Users\Admin\Pictures\RenameMerge.crw.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\TraceFind.raw => \??\c:\Users\Admin\Pictures\TraceFind.raw.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\WriteDisconnect.png => \??\c:\Users\Admin\Pictures\WriteDisconnect.png.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File renamed C:\Users\Admin\Pictures\FindMove.tif => \??\c:\Users\Admin\Pictures\FindMove.tif.ReadManual.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 736 cmd.exe -
Drops desktop.ini file(s) 32 IoCs
Processes:
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exedescription ioc process File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\EJUJZXD4\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\B30T6PBA\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CC9LYJ78\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\76WFQHVB\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe -
Drops file in Program Files directory 3 IoCs
Processes:
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exedescription ioc process File created \??\c:\Program Files (x86)\RecoveryManual.html 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File created \??\c:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RecoveryManual.html 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe File created \??\c:\Program Files\RecoveryManual.html 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe -
Modifies registry class 5 IoCs
Processes:
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.F30D4911\shell 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.F30D4911\shell\Open 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.F30D4911\shell\Open\command\ = "explorer.exe RecoveryManual.html" 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.F30D4911\shell\Open\command 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.F30D4911 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exepid process 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exedescription pid process Token: SeRestorePrivilege 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe Token: SeDebugPrivilege 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.execmd.exedescription pid process target process PID 1588 wrote to memory of 736 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe cmd.exe PID 1588 wrote to memory of 736 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe cmd.exe PID 1588 wrote to memory of 736 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe cmd.exe PID 1588 wrote to memory of 736 1588 0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe cmd.exe PID 736 wrote to memory of 1100 736 cmd.exe attrib.exe PID 736 wrote to memory of 1100 736 cmd.exe attrib.exe PID 736 wrote to memory of 1100 736 cmd.exe attrib.exe PID 736 wrote to memory of 1100 736 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe"C:\Users\Admin\AppData\Local\Temp\0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\0F766190.bat" "C:\Users\Admin\AppData\Local\Temp\0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\0fa0ad3dbf321d2c7c645aab928176d7a2d21b64d84d720829b67ad6c37381c7.exe"3⤵
- Views/modifies file attributes
PID:1100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0F766190.batMD5
348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
memory/736-56-0x0000000000000000-mapping.dmp
-
memory/1100-58-0x0000000000000000-mapping.dmp
-
memory/1588-55-0x00000000764D1000-0x00000000764D3000-memory.dmpFilesize
8KB