Resubmissions
17-05-2024 14:06
240517-reh7esbc83 1017-05-2024 14:05
240517-rdxnesbb2x 1017-05-2024 14:04
240517-rdkc4aba91 1017-05-2024 14:00
240517-raznlsbc33 1009-01-2022 14:18
220109-rl99gsdee2 10Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-01-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe
Resource
win10-en-20211208
General
-
Target
00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe
-
Size
66KB
-
MD5
2c26b319e378755596f0ac6d293798c8
-
SHA1
280a4cfcf5dd87898c3731b680efe061bdb7a9fe
-
SHA256
00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99
-
SHA512
0c2b53a3fed1dbbae64e7f1e7c17a89b5dc607ba40caecd5496e18ffd84cdad844e926742d9fc82a715d6e8b01a1c483d97d54f5be1f2d6997107946f2a3fe4b
Malware Config
Extracted
\??\c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RecoveryManual.html
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompareApprove.crw => \??\c:\Users\Admin\Pictures\CompareApprove.crw.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File renamed C:\Users\Admin\Pictures\ImportDismount.crw => \??\c:\Users\Admin\Pictures\ImportDismount.crw.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\SearchResume.tiff 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File renamed C:\Users\Admin\Pictures\SearchResume.tiff => \??\c:\Users\Admin\Pictures\SearchResume.tiff.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File renamed C:\Users\Admin\Pictures\StopSync.png => \??\c:\Users\Admin\Pictures\StopSync.png.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File renamed C:\Users\Admin\Pictures\SuspendAdd.png => \??\c:\Users\Admin\Pictures\SuspendAdd.png.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\SuspendTrace.tiff 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File renamed C:\Users\Admin\Pictures\SuspendTrace.tiff => \??\c:\Users\Admin\Pictures\SuspendTrace.tiff.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File renamed C:\Users\Admin\Pictures\UnregisterWait.raw => \??\c:\Users\Admin\Pictures\UnregisterWait.raw.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File renamed C:\Users\Admin\Pictures\UseExport.tif => \??\c:\Users\Admin\Pictures\UseExport.tif.ReadManual.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe -
Deletes itself 1 IoCs
pid Process 1508 cmd.exe -
Drops desktop.ini file(s) 32 IoCs
description ioc Process File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\K819CMRP\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\QDAZQ7UR\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NK9YD4KU\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\S3IV548V\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\Program Files\RecoveryManual.html 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File created \??\c:\Program Files (x86)\RecoveryManual.html 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe File created \??\c:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RecoveryManual.html 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\.F30D4911 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\.F30D4911\shell 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\.F30D4911\shell\Open 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\.F30D4911\shell\Open\command\ = "explorer.exe RecoveryManual.html" 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\.F30D4911\shell\Open\command 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1520 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe 1520 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1520 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe Token: SeDebugPrivilege 1520 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1508 1520 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe 29 PID 1520 wrote to memory of 1508 1520 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe 29 PID 1520 wrote to memory of 1508 1520 00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe 29 PID 1508 wrote to memory of 860 1508 cmd.exe 31 PID 1508 wrote to memory of 860 1508 cmd.exe 31 PID 1508 wrote to memory of 860 1508 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 860 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe"C:\Users\Admin\AppData\Local\Temp\00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\0F762829.bat" "C:\Users\Admin\AppData\Local\Temp\00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\00ed4c347cd62526226363a0aceb851b2ef7e3a4da78433a28f2cd6cbd5f1b99.bin.exe"3⤵
- Views/modifies file attributes
PID:860
-
-