Analysis
-
max time kernel
145s -
max time network
181s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:50
Static task
static1
Behavioral task
behavioral1
Sample
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe
Resource
win10-en-20211208
General
-
Target
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe
-
Size
164KB
-
MD5
0aa7a8c026553f595305d1f1d01a5f26
-
SHA1
62c68baee6585eb627279197214eeacb57c83317
-
SHA256
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438
-
SHA512
8e7059dde8edff40b6d8bb90298df05e40c2402972031e5e0565efbe4db5256ab16a164ed3ef416eb125ff982c3bd6b2ebdc3ce0cd42f229fc324f583b236a87
Malware Config
Extracted
C:\onmxh7n-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C276FDF4E8A04693
http://decryptor.top/C276FDF4E8A04693
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exedescription ioc process File renamed C:\Users\Admin\Pictures\WatchGet.png => \??\c:\users\admin\pictures\WatchGet.png.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File renamed C:\Users\Admin\Pictures\WriteRepair.tif => \??\c:\users\admin\pictures\WriteRepair.tif.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File renamed C:\Users\Admin\Pictures\CompareGet.raw => \??\c:\users\admin\pictures\CompareGet.raw.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File renamed C:\Users\Admin\Pictures\DisconnectRegister.tif => \??\c:\users\admin\pictures\DisconnectRegister.tif.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File renamed C:\Users\Admin\Pictures\GrantSkip.tif => \??\c:\users\admin\pictures\GrantSkip.tif.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File renamed C:\Users\Admin\Pictures\SuspendPublish.raw => \??\c:\users\admin\pictures\SuspendPublish.raw.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File renamed C:\Users\Admin\Pictures\WaitPublish.raw => \??\c:\users\admin\pictures\WaitPublish.raw.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File renamed C:\Users\Admin\Pictures\UnprotectComplete.tif => \??\c:\users\admin\pictures\UnprotectComplete.tif.onmxh7n e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exedescription ioc process File opened (read-only) \??\Q: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\R: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\U: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\V: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\W: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\A: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\F: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\I: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\Z: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\D: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\H: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\K: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\X: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\S: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\T: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\Y: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\J: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\M: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\N: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\L: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\O: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\P: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\B: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\E: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened (read-only) \??\G: e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8mq9fi.bmp" e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe -
Drops file in Program Files directory 32 IoCs
Processes:
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exedescription ioc process File created \??\c:\program files (x86)\onmxh7n-readme.txt e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\CompareConfirm.mpeg2 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\ResolveComplete.rar e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\UnregisterDisable.M2TS e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\ExportAssert.m3u e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\InitializeWait.mht e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\a73a6b0b.lock e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\a73a6b0b.lock e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\EditMeasure.reg e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\SyncFind.tiff e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\UpdateClose.wmf e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\WatchNew.7z e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\onmxh7n-readme.txt e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\AddWrite.docx e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files\onmxh7n-readme.txt e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\ExitBackup.ttf e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\FindConvert.pot e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\GrantImport.vsdx e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files\a73a6b0b.lock e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\MergeSync.mov e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\ReadShow.iso e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\onmxh7n-readme.txt e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\AddDisconnect.raw e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\DebugConfirm.dotm e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\DisableComplete.xps e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\DisableRevoke.rle e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\RepairOut.tiff e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\a73a6b0b.lock e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files (x86)\a73a6b0b.lock e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\BlockWatch.mpeg3 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification \??\c:\program files\ReceiveGroup.vsw e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\onmxh7n-readme.txt e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe -
Drops file in Windows directory 64 IoCs
Processes:
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exedescription ioc process File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8f54bc532eadc7ab.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-o..ct-picker.resources_31bf3856ad364e35_6.1.7600.16385_es-es_6674b4d9f148cbe1_objsel.dll.mui_9b915792 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-w..-infrastructure-bsp_31bf3856ad364e35_6.1.7601.17514_none_ba5ac0f18b8dd799_mswsock.dll_e2ad0f2d e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_6.1.7600.16385_none_70644a8bdb0d9303_app850.fon_e2e4776b e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-truetype-arial_31bf3856ad364e35_6.1.7601.17514_none_d0a9759ec3fa9e2d_arial.ttf_e828c109 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-truetype-ebrima_31bf3856ad364e35_6.1.7600.16385_none_2a70c05575ba0bb8_ebrima.ttf_8897b9ba e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_sl-si_d44bd64014e9029b_comdlg32.dll.mui_ac8e62f4 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_6.1.7600.16385_it-it_6777afadccc8e29b_bootmgr.efi.mui_be5d0075 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_6.1.7600.16385_en-us_1d298d428a973659_gpsvc.dll.mui_0c160ac2 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft.windows.winhttp.resources_31bf3856ad364e35_6.0.7600.16385_en-us_3d419a3aa700badf.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-duser.resources_31bf3856ad364e35_6.1.7600.16385_de-de_cc15f8cd954588fe_duser.dll.mui_3c369ac4 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-duser.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_a3d716fd41699423.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-h..p-provsvc.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_15d2dbee6e2bcc6d.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..itmap-ms_sans_serif_31bf3856ad364e35_6.1.7600.16385_none_ac9f9e10add68c8b_sserifee.fon_12eef23f e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-fixed_31bf3856ad364e35_6.1.7600.16385_none_db04d3f548508fd9_vgafixr.fon_de339586 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-imageanalysis_31bf3856ad364e35_6.1.7601.17514_none_a6821d2940c2bcdc.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-crypt32-dll.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_708006950e931217.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-searchfolder.resources_31bf3856ad364e35_6.1.7600.16385_en-us_7d2dc7126d5af514_searchfolder.dll.mui_8c30bdaf e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-x..ollmentui.resources_31bf3856ad364e35_6.1.7600.16385_de-de_8fc1daf00cc20e86.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..cardsubsystemclient_31bf3856ad364e35_6.1.7601.17514_none_770a7fb29038c2c0_winscard.dll_cfd3258d e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..entication-usermode_31bf3856ad364e35_6.1.7600.16385_none_9616b4da8e0572c5_ntmarta.dll_cd048e61 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..cture-bsp.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_58a676633aacc4b4.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_zh-cn_4c840294b551dbf9_comdlg32.dll.mui_ac8e62f4 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_th-th_d34f7dd5f675454a.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-a..ence-infrastructure_31bf3856ad364e35_6.1.7601.17514_none_3337092d63596104_aelupsvc.dll_f420497b e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..isc-tools.resources_31bf3856ad364e35_6.1.7600.16385_en-us_3f3bc9163ae8cff9_netmsg.dll.mui_ab0f7c73 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_ru-ru_2b58ac2f7d84b22c.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-appid.resources_31bf3856ad364e35_6.1.7600.16385_en-us_9c7424fcfaec8d6b_appidapi.dll.mui_b6af37bb e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_6.1.7600.16385_en-us_6084741c7167c84b_listsvc.dll.mui_27f0fc85 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..temclient.resources_31bf3856ad364e35_6.1.7600.16385_de-de_2923fe40760e3420.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-sqmapi_31bf3856ad364e35_6.1.7601.17514_none_00451cf8631056b6_sqmapi.dll_3755dd17 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_pl-pl_be0701531dbe7588_comctl32.dll.mui_0da4e682 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_6.1.7600.16385_es-es_1cf4ea268abe27fe_gpapi.dll.mui_ef0a9748 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-sendmail_31bf3856ad364e35_6.1.7600.16385_none_b6de6c0835b43484_mailrecipient.mapimail_d3a49bc0 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..unterinfrastructure_31bf3856ad364e35_6.1.7601.17514_none_da00ad1949e715ad_lodctr.exe_b02cefba e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_5707b336a41b04a4_tcpip.sys.mui_5885771c e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-winsock-core.resources_31bf3856ad364e35_6.1.7600.16385_en-us_a7ddb2029817a18e.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-dhcp-client-dll_31bf3856ad364e35_6.1.7601.17514_none_d961938b8cd1e885_dhcpcore6.dll_38a935e4 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-w..eservices.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_7bb0bd650e72abc4_wiaservc.dll.mui_54051b53 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e8934bff7a284e2f.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-c..ermodepnp.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ea0031961eb6e40c_umpnpmgr.dll.mui_d66aed17 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_6.1.7600.16385_es-es_4f8620c6384385cb_scfilter.sys.mui_cebab716 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-security-spp_31bf3856ad364e35_6.1.7601.17514_none_78875ce737927d27_sppsvc.exe_fc6922a9 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-grouppolicy-base_31bf3856ad364e35_6.1.7600.16385_none_8e6cfdd835146ea7_gpapi.dll_868dd225 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-f..libraries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_8aca445a5126eb01_ulib.dll.mui_bb7d4db5 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_uk-ua_cf512494a37b217c.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-netbt_31bf3856ad364e35_6.1.7601.17514_none_be8acdd10de3b1a6.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_6.1.7600.16385_en-us_d73605ecd5ec6277_iprtrmgr.dll.mui_eb023b92 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-riched32_31bf3856ad364e35_6.1.7601.17514_none_fb26b945993b2f11_riched20.dll_fb578f95 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-shlwapi_31bf3856ad364e35_6.1.7601.17514_none_fbe11bf002f10455_shlwapi.dll_1eec0a2e e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-m..ents-mdac.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_5c8a8ee4f97b7f12_sqlsoldb.chm_9573a554 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mprmsg.resources_31bf3856ad364e35_6.1.7601.17514_en-us_e305dc58e46187b4_mprmsg.dll.mui_210d8c31 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-a..core-base.resources_31bf3856ad364e35_6.1.7600.16385_de-de_c110f4bd66485354.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-shlwapi.resources_31bf3856ad364e35_6.1.7600.16385_es-es_53712ba885839443.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-lua.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ed028e8c78f92183_appinfo.dll.mui_cfd93456 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mfc42x.resources_31bf3856ad364e35_6.1.7600.16385_de-de_75a5d492b9d7cd2f.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_43dd555017315455_wininit.exe.mui_997435f5 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_6e9ba25f21709c15_netiougc.exe.mui_ad7a9e4d e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_en-us_a547f57d755ff33d_msimsg.dll.mui_72e8994f e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..tional-codepage-857_31bf3856ad364e35_6.1.7600.16385_none_2adc8eeeb4e35a81_c_857.nls_accf5ac9 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-irdacoreprotocol_31bf3856ad364e35_6.1.7601.17514_none_462a9e44e01787f2_wshirda.dll_1775ca24 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-l..istry-support-tcpip_31bf3856ad364e35_6.1.7601.17514_none_e4433b761c0c84cd.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ient-core.resources_31bf3856ad364e35_7.5.7601.17514_fr-fr_172b5419eddfc893.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..per-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_de-de_16322155c9df9531.manifest e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1492 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exepid process 1128 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1364 vssvc.exe Token: SeRestorePrivilege 1364 vssvc.exe Token: SeAuditPrivilege 1364 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.execmd.exedescription pid process target process PID 1128 wrote to memory of 1240 1128 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe cmd.exe PID 1128 wrote to memory of 1240 1128 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe cmd.exe PID 1128 wrote to memory of 1240 1128 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe cmd.exe PID 1128 wrote to memory of 1240 1128 e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe cmd.exe PID 1240 wrote to memory of 1492 1240 cmd.exe vssadmin.exe PID 1240 wrote to memory of 1492 1240 cmd.exe vssadmin.exe PID 1240 wrote to memory of 1492 1240 cmd.exe vssadmin.exe PID 1240 wrote to memory of 1492 1240 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe"C:\Users\Admin\AppData\Local\Temp\e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1128-54-0x0000000075F21000-0x0000000075F23000-memory.dmpFilesize
8KB