Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-01-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe
Resource
win10-en-20211208
General
-
Target
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe
-
Size
345KB
-
MD5
5d40a2c6b936453af9895f17a78eee4f
-
SHA1
8df94028ed5b475b401489211d6757bdf545fbd4
-
SHA256
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb
-
SHA512
5a803d4dca63df0f92a142480fa5fc64e7569fe081f4a7caec9c9bedb435886ed712cb483b12126c3f1733707cd569f3a1c7cbeffa20aa1de547dda2426092d9
Malware Config
Extracted
C:\HowToRestoreYourFiles.txt
rook
Signatures
-
Rook
Rook is a ransomware which copies from NightSky ransomware.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exedescription ioc process File renamed C:\Users\Admin\Pictures\CloseDebug.tif => C:\Users\Admin\Pictures\CloseDebug.tif.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened for modification C:\Users\Admin\Pictures\CloseDebug.tif.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened for modification C:\Users\Admin\Pictures\MoveUnprotect.crw.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened for modification C:\Users\Admin\Pictures\SubmitLimit.tiff.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File renamed C:\Users\Admin\Pictures\MoveUnprotect.crw => C:\Users\Admin\Pictures\MoveUnprotect.crw.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File renamed C:\Users\Admin\Pictures\RedoCopy.raw => C:\Users\Admin\Pictures\RedoCopy.raw.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened for modification C:\Users\Admin\Pictures\SubmitLimit.tiff 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened for modification C:\Users\Admin\Pictures\RedoCopy.raw.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File renamed C:\Users\Admin\Pictures\SubmitLimit.tiff => C:\Users\Admin\Pictures\SubmitLimit.tiff.Rook 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe -
Deletes itself 1 IoCs
Processes:
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exepid process 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exedescription ioc process File opened (read-only) \??\H: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\K: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\X: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\N: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\T: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\Y: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\O: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\F: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\W: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\R: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\I: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\S: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\B: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\Q: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\E: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\U: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\A: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\Z: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\V: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\M: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\P: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\G: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\J: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe File opened (read-only) \??\L: 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 3712 vssadmin.exe 3588 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exepid process 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exepid process 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 3924 vssvc.exe Token: SeRestorePrivilege 3924 vssvc.exe Token: SeAuditPrivilege 3924 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.execmd.execmd.exedescription pid process target process PID 2416 wrote to memory of 3504 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe cmd.exe PID 2416 wrote to memory of 3504 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe cmd.exe PID 3504 wrote to memory of 3712 3504 cmd.exe vssadmin.exe PID 3504 wrote to memory of 3712 3504 cmd.exe vssadmin.exe PID 2416 wrote to memory of 672 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe cmd.exe PID 2416 wrote to memory of 672 2416 925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe cmd.exe PID 672 wrote to memory of 3588 672 cmd.exe vssadmin.exe PID 672 wrote to memory of 3588 672 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe"C:\Users\Admin\AppData\Local\Temp\925e2f58599cfb91a03f516986676a206fc9af42000de106de6af32e9ba558bb.exe"1⤵
- Modifies extensions of user files
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3588
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3924