Analysis
-
max time kernel
123s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
30-11-2021 21:37
Static task
static1
Behavioral task
behavioral1
Sample
f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe
Resource
win10-en-20211104
General
-
Target
f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe
-
Size
170KB
-
MD5
bec9b3480934ce3d30c25e1272f60d02
-
SHA1
104d9e31e34ba8517f701552594f1fc167550964
-
SHA256
f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789
-
SHA512
99ebdaf100af272678b92cdb0743cdb6a1b4a8ecc83a1fb3127dfc53bf609a655715bf9ee3a4a7dbee7ae21cb5ff98283772d9bf5641e394b7e3c21a1010cdbc
Malware Config
Extracted
C:\Documents and Settings\HowToRestoreYourFiles.txt
rook
Signatures
-
Rook
Rook is a ransomware which copies from NightSky ransomware.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RestoreShow.tif => C:\Users\Admin\Pictures\RestoreShow.tif.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\ShowStart.tiff.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\RestoreShow.tif.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\BackupBlock.tiff f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File renamed C:\Users\Admin\Pictures\ConvertToUpdate.tiff => C:\Users\Admin\Pictures\ConvertToUpdate.tiff.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\NewMove.tif.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File renamed C:\Users\Admin\Pictures\ShowStart.tiff => C:\Users\Admin\Pictures\ShowStart.tiff.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\ConvertToUpdate.tiff.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\ShowStart.tiff f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File renamed C:\Users\Admin\Pictures\BackupBlock.tiff => C:\Users\Admin\Pictures\BackupBlock.tiff.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\BackupBlock.tiff.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened for modification C:\Users\Admin\Pictures\ConvertToUpdate.tiff f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File renamed C:\Users\Admin\Pictures\NewMove.tif => C:\Users\Admin\Pictures\NewMove.tif.Rook f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe -
Deletes itself 1 IoCs
pid Process 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\I: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\O: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\G: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\K: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\M: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\E: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\R: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\T: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\S: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\F: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\B: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\P: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\H: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\J: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\V: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\N: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\Q: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\Y: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\U: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\A: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\L: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\Z: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe File opened (read-only) \??\X: f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 312 vssadmin.exe 1112 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2844 vssvc.exe Token: SeRestorePrivilege 2844 vssvc.exe Token: SeAuditPrivilege 2844 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2624 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe 69 PID 2512 wrote to memory of 2624 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe 69 PID 2624 wrote to memory of 1112 2624 cmd.exe 71 PID 2624 wrote to memory of 1112 2624 cmd.exe 71 PID 2512 wrote to memory of 956 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe 76 PID 2512 wrote to memory of 956 2512 f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe 76 PID 956 wrote to memory of 312 956 cmd.exe 78 PID 956 wrote to memory of 312 956 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe"C:\Users\Admin\AppData\Local\Temp\f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.bin.exe"1⤵
- Modifies extensions of user files
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:312
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2844