Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
30-11-2021 13:30
Static task
static1
Behavioral task
behavioral1
Sample
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe
Resource
win10-en-20211014
General
-
Target
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe
-
Size
5.4MB
-
MD5
bf8dafaedf5b031ba01200e2ec608f96
-
SHA1
3e6689dc6a8a717b4114a7fe65bba594c597c7b9
-
SHA256
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b
-
SHA512
625535d71b2ca8a547924f08357eda1dc1d669b6c4ae1d0a436af1435fb9af58f24b63cde71588cee1785e36bb950c8c412db9c1e0541e65d11f2a13955fe7f6
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt
Signatures
-
Deletes NTFS Change Journal 2 TTPs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
RansomEXX Ransomware
Targeted ransomware with variants which affect Windows and Linux systems.
-
Clears Windows event logs 1 TTPs
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 992 bcdedit.exe 1340 bcdedit.exe -
pid Process 1560 wbadmin.exe -
Disables use of System Restore points 1 TTPs
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UpdateDismount.tif => C:\Users\Admin\Pictures\UpdateDismount.tif.txd0t 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe File renamed C:\Users\Admin\Pictures\ApproveRequest.tif => C:\Users\Admin\Pictures\ApproveRequest.tif.txd0t 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\JoinDismount.tiff 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe File renamed C:\Users\Admin\Pictures\JoinDismount.tiff => C:\Users\Admin\Pictures\JoinDismount.tiff.txd0t 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe File renamed C:\Users\Admin\Pictures\ProtectShow.png => C:\Users\Admin\Pictures\ProtectShow.png.txd0t 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe -
Overwrites deleted data with Cipher tool 1 TTPs
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
resource yara_rule behavioral1/memory/1336-59-0x0000000001140000-0x0000000001A1C000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: cipher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeSecurityPrivilege 1732 wevtutil.exe Token: SeBackupPrivilege 1732 wevtutil.exe Token: SeSecurityPrivilege 588 wevtutil.exe Token: SeBackupPrivilege 588 wevtutil.exe Token: SeSecurityPrivilege 1904 wevtutil.exe Token: SeBackupPrivilege 1904 wevtutil.exe Token: SeSecurityPrivilege 1748 wevtutil.exe Token: SeBackupPrivilege 1748 wevtutil.exe Token: SeBackupPrivilege 964 wbengine.exe Token: SeRestorePrivilege 964 wbengine.exe Token: SeSecurityPrivilege 964 wbengine.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2036 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 30 PID 1336 wrote to memory of 2036 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 30 PID 1336 wrote to memory of 2036 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 30 PID 1336 wrote to memory of 2036 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 30 PID 1336 wrote to memory of 1340 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 33 PID 1336 wrote to memory of 1340 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 33 PID 1336 wrote to memory of 1340 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 33 PID 1336 wrote to memory of 1340 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 33 PID 1336 wrote to memory of 992 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 32 PID 1336 wrote to memory of 992 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 32 PID 1336 wrote to memory of 992 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 32 PID 1336 wrote to memory of 992 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 32 PID 1336 wrote to memory of 308 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 34 PID 1336 wrote to memory of 308 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 34 PID 1336 wrote to memory of 308 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 34 PID 1336 wrote to memory of 308 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 34 PID 1336 wrote to memory of 1940 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 36 PID 1336 wrote to memory of 588 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 35 PID 1336 wrote to memory of 1940 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 36 PID 1336 wrote to memory of 588 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 35 PID 1336 wrote to memory of 1940 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 36 PID 1336 wrote to memory of 1940 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 36 PID 1336 wrote to memory of 588 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 35 PID 1336 wrote to memory of 588 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 35 PID 1336 wrote to memory of 1560 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 31 PID 1336 wrote to memory of 1560 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 31 PID 1336 wrote to memory of 1560 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 31 PID 1336 wrote to memory of 1560 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 31 PID 1336 wrote to memory of 1748 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 39 PID 1336 wrote to memory of 1748 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 39 PID 1336 wrote to memory of 1748 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 39 PID 1336 wrote to memory of 1748 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 39 PID 1336 wrote to memory of 1904 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 37 PID 1336 wrote to memory of 1904 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 37 PID 1336 wrote to memory of 1904 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 37 PID 1336 wrote to memory of 1904 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 37 PID 1336 wrote to memory of 1732 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 38 PID 1336 wrote to memory of 1732 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 38 PID 1336 wrote to memory of 1732 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 38 PID 1336 wrote to memory of 1732 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 38 PID 1336 wrote to memory of 1444 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 40 PID 1336 wrote to memory of 1444 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 40 PID 1336 wrote to memory of 1444 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 40 PID 1336 wrote to memory of 1444 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 40 PID 1336 wrote to memory of 1756 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 41 PID 1336 wrote to memory of 1756 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 41 PID 1336 wrote to memory of 1756 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 41 PID 1336 wrote to memory of 1756 1336 1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe"1⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\System32\fsutil.exe"C:\Windows\System32\fsutil.exe" usn deletejournal /D C:2⤵PID:2036
-
-
C:\Windows\System32\wbadmin.exe"C:\Windows\System32\wbadmin.exe" delete catalog -quiet2⤵
- Deletes backup catalog
PID:1560
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:992
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1340
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:308
-
-
C:\Windows\System32\wevtutil.exe"C:\Windows\System32\wevtutil.exe" cl System2⤵
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Windows\System32\wevtutil.exe"C:\Windows\System32\wevtutil.exe" sl Security /e:false2⤵PID:1940
-
-
C:\Windows\System32\wevtutil.exe"C:\Windows\System32\wevtutil.exe" cl Application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\System32\wevtutil.exe"C:\Windows\System32\wevtutil.exe" cl Security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\System32\wevtutil.exe"C:\Windows\System32\wevtutil.exe" cl Setup2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\cipher.exe"C:\Windows\System32\cipher.exe" /w:C:2⤵PID:1444
-
-
C:\Windows\SysWOW64\cipher.exe"C:\Windows\System32\cipher.exe" /w:D:2⤵
- Enumerates connected drives
PID:1756
-
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:892
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1944