Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
20-12-2021 20:51
Static task
static1
Behavioral task
behavioral1
Sample
rook1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
rook1.exe
Resource
win10-en-20211208
General
-
Target
rook1.exe
-
Size
5.4MB
-
MD5
4f7adc32ec67c1a55853ef828fe58707
-
SHA1
36de7997949ac3b9b456023fb072b9a8cd84ade8
-
SHA256
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b
-
SHA512
a45e4a20133c842037789157c3ed845afdefbb0d2fe3958d75f0cb3cdfeee106262f9de0e0aca92ac84a0211432cd19773e0f769b970ddb8a80e5f7855676f74
Malware Config
Extracted
C:\odt\HowToRestoreYourFiles.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
rook1.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\GrantRegister.raw.Rook rook1.exe File opened for modification C:\Users\Admin\Pictures\DisconnectLimit.tiff rook1.exe File opened for modification C:\Users\Admin\Pictures\DisconnectLimit.tiff.Rook rook1.exe File renamed C:\Users\Admin\Pictures\DismountRevoke.tif => C:\Users\Admin\Pictures\DismountRevoke.tif.Rook rook1.exe File opened for modification C:\Users\Admin\Pictures\DismountRevoke.tif.Rook rook1.exe File renamed C:\Users\Admin\Pictures\GrantRegister.raw => C:\Users\Admin\Pictures\GrantRegister.raw.Rook rook1.exe File renamed C:\Users\Admin\Pictures\ResizeWait.crw => C:\Users\Admin\Pictures\ResizeWait.crw.Rook rook1.exe File opened for modification C:\Users\Admin\Pictures\ResizeWait.crw.Rook rook1.exe File renamed C:\Users\Admin\Pictures\DisconnectLimit.tiff => C:\Users\Admin\Pictures\DisconnectLimit.tiff.Rook rook1.exe File renamed C:\Users\Admin\Pictures\InitializeSelect.crw => C:\Users\Admin\Pictures\InitializeSelect.crw.Rook rook1.exe File opened for modification C:\Users\Admin\Pictures\InitializeSelect.crw.Rook rook1.exe File renamed C:\Users\Admin\Pictures\ProtectRename.tif => C:\Users\Admin\Pictures\ProtectRename.tif.Rook rook1.exe File opened for modification C:\Users\Admin\Pictures\ProtectRename.tif.Rook rook1.exe -
Processes:
resource yara_rule behavioral2/memory/2512-115-0x00007FF661540000-0x00007FF661E5D000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rook1.exedescription ioc process File opened (read-only) \??\Z: rook1.exe File opened (read-only) \??\X: rook1.exe File opened (read-only) \??\W: rook1.exe File opened (read-only) \??\R: rook1.exe File opened (read-only) \??\O: rook1.exe File opened (read-only) \??\G: rook1.exe File opened (read-only) \??\J: rook1.exe File opened (read-only) \??\L: rook1.exe File opened (read-only) \??\V: rook1.exe File opened (read-only) \??\B: rook1.exe File opened (read-only) \??\M: rook1.exe File opened (read-only) \??\E: rook1.exe File opened (read-only) \??\T: rook1.exe File opened (read-only) \??\U: rook1.exe File opened (read-only) \??\A: rook1.exe File opened (read-only) \??\S: rook1.exe File opened (read-only) \??\Q: rook1.exe File opened (read-only) \??\Y: rook1.exe File opened (read-only) \??\I: rook1.exe File opened (read-only) \??\F: rook1.exe File opened (read-only) \??\H: rook1.exe File opened (read-only) \??\P: rook1.exe File opened (read-only) \??\K: rook1.exe File opened (read-only) \??\N: rook1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 864 vssadmin.exe 2408 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rook1.exepid process 2512 rook1.exe 2512 rook1.exe 2512 rook1.exe 2512 rook1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 876 vssvc.exe Token: SeRestorePrivilege 876 vssvc.exe Token: SeAuditPrivilege 876 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rook1.execmd.execmd.exedescription pid process target process PID 2512 wrote to memory of 3168 2512 rook1.exe cmd.exe PID 2512 wrote to memory of 3168 2512 rook1.exe cmd.exe PID 3168 wrote to memory of 864 3168 cmd.exe vssadmin.exe PID 3168 wrote to memory of 864 3168 cmd.exe vssadmin.exe PID 2512 wrote to memory of 1148 2512 rook1.exe cmd.exe PID 2512 wrote to memory of 1148 2512 rook1.exe cmd.exe PID 1148 wrote to memory of 2408 1148 cmd.exe vssadmin.exe PID 1148 wrote to memory of 2408 1148 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rook1.exe"C:\Users\Admin\AppData\Local\Temp\rook1.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2408
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:876