Analysis

  • max time kernel
    165s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    12/02/2022, 00:35 UTC

General

  • Target

    0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe

  • Size

    994KB

  • MD5

    59121158ef88411544355a5bf293297c

  • SHA1

    636510582fb27d2a23da35eeb55ef577f52caf68

  • SHA256

    0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c

  • SHA512

    fefbe9c3289f3cb410ddd8e742b3d27fba035827764aad47d304b9f0f23aef89a7215d85c6371c9900898b2b332b8b3a45a7fc117e33c43928f22b695609d4e2

Malware Config

Signatures

  • Ouroboros/Zeropadypt

    Ransomware family based on open-source CryptoWire.

  • Modifies Windows Firewall 1 TTPs
  • Drops desktop.ini file(s) 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
    "C:\Users\Admin\AppData\Local\Temp\0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c net stop SQLWriter
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Windows\SysWOW64\net.exe
        net stop SQLWriter
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop SQLWriter
          4⤵
            PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c net stop SQLBrowser
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4848
        • C:\Windows\SysWOW64\net.exe
          net stop SQLBrowser
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4916
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop SQLBrowser
            4⤵
              PID:4852
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c net stop MSSQLSERVER
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1164
          • C:\Windows\SysWOW64\net.exe
            net stop MSSQLSERVER
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop MSSQLSERVER
              4⤵
                PID:4444
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c net stop MSSQL$CONTOSO1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1272
            • C:\Windows\SysWOW64\net.exe
              net stop MSSQL$CONTOSO1
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3552
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop MSSQL$CONTOSO1
                4⤵
                  PID:408
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c net stop MSDTC
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2892
              • C:\Windows\SysWOW64\net.exe
                net stop MSDTC
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1940
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop MSDTC
                  4⤵
                    PID:1960
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures
                2⤵
                  PID:3856
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no
                  2⤵
                    PID:2384
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet
                    2⤵
                      PID:2936
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:216
                      • C:\Windows\SysWOW64\net.exe
                        net stop SQLSERVERAGENT
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4660
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SQLSERVERAGENT
                          4⤵
                            PID:3600
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c net stop MSSQLSERVER
                        2⤵
                          PID:3464
                          • C:\Windows\SysWOW64\net.exe
                            net stop MSSQLSERVER
                            3⤵
                              PID:4720
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop MSSQLSERVER
                                4⤵
                                  PID:3636
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c net stop vds
                              2⤵
                                PID:5096
                                • C:\Windows\SysWOW64\net.exe
                                  net stop vds
                                  3⤵
                                    PID:4216
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop vds
                                      4⤵
                                        PID:4244
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off
                                    2⤵
                                      PID:3572
                                      • C:\Windows\SysWOW64\netsh.exe
                                        netsh advfirewall set currentprofile state off
                                        3⤵
                                          PID:948
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable
                                        2⤵
                                          PID:1784
                                          • C:\Windows\SysWOW64\netsh.exe
                                            netsh firewall set opmode mode=disable
                                            3⤵
                                              PID:2356
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                          1⤵
                                            PID:1088
                                          • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                            C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                            1⤵
                                            • Drops file in Windows directory
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2540

                                          Network

                                          • flag-us
                                            DNS
                                            www.sfml-dev.org
                                            0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            www.sfml-dev.org
                                            IN A
                                            Response
                                            www.sfml-dev.org
                                            IN CNAME
                                            sfml-dev.org
                                            sfml-dev.org
                                            IN A
                                            78.47.82.133
                                          • flag-de
                                            GET
                                            http://www.sfml-dev.org/ip-provider.php
                                            0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
                                            Remote address:
                                            78.47.82.133:80
                                            Request
                                            GET /ip-provider.php HTTP/1.0
                                            content-length: 0
                                            from: user@sfml-dev.org
                                            host: www.sfml-dev.org
                                            user-agent: libsfml-network/2.x
                                            Response
                                            HTTP/1.1 200 OK
                                            Date: Sat, 12 Feb 2022 00:36:10 GMT
                                            Server: Apache
                                            Content-Security-Policy: default-src 'none'; script-src 'self' 'unsafe-eval' 'unsafe-inline' *.sfml-dev.org www.gstatic.com www.google.com www.google-analytics.com ssl.google-analytics.com; connect-src 'self' www.google-analytics.com; img-src 'self' https: data:; style-src 'self' 'unsafe-inline' *.sfml-dev.org fonts.googleapis.com; media-src https: data:; font-src 'self' fonts.gstatic.com; base-uri 'self'; form-action 'self'; frame-src https: data:
                                            Content-Length: 12
                                            Connection: close
                                            Content-Type: text/html; charset=UTF-8
                                          • flag-us
                                            DNS
                                            crl4.digicert.com
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            crl4.digicert.com
                                            IN A
                                            Response
                                            crl4.digicert.com
                                            IN CNAME
                                            cs9.wac.phicdn.net
                                            cs9.wac.phicdn.net
                                            IN A
                                            93.184.220.29
                                          • flag-us
                                            GET
                                            http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
                                            Remote address:
                                            93.184.220.29:80
                                            Request
                                            GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D HTTP/1.1
                                            Connection: Keep-Alive
                                            Accept: */*
                                            User-Agent: Microsoft-CryptoAPI/10.0
                                            Host: ocsp.digicert.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Accept-Ranges: bytes
                                            Age: 2321
                                            Cache-Control: max-age=117182
                                            Content-Type: application/ocsp-response
                                            Date: Sat, 12 Feb 2022 00:36:50 GMT
                                            Etag: "62061ecf-1d7"
                                            Expires: Sun, 13 Feb 2022 09:09:52 GMT
                                            Last-Modified: Fri, 11 Feb 2022 08:31:11 GMT
                                            Server: ECS (amb/6BAD)
                                            X-Cache: HIT
                                            Content-Length: 471
                                          • flag-us
                                            GET
                                            http://crl3.digicert.com/Omniroot2025.crl
                                            Remote address:
                                            93.184.220.29:80
                                            Request
                                            GET /Omniroot2025.crl HTTP/1.1
                                            Connection: Keep-Alive
                                            Accept: */*
                                            User-Agent: Microsoft-CryptoAPI/10.0
                                            Host: crl3.digicert.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Accept-Ranges: bytes
                                            Age: 3770
                                            Cache-Control: max-age=10800
                                            Content-Type: application/pkix-crl
                                            Date: Sat, 12 Feb 2022 00:36:55 GMT
                                            Etag: "2114594392"
                                            Expires: Sat, 12 Feb 2022 03:36:55 GMT
                                            Last-Modified: Tue, 08 Feb 2022 23:15:25 GMT
                                            Server: ECS (amb/6BBA)
                                            X-Cache: HIT
                                            Content-Length: 7869
                                          • flag-us
                                            GET
                                            http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D
                                            Remote address:
                                            93.184.220.29:80
                                            Request
                                            GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D HTTP/1.1
                                            Connection: Keep-Alive
                                            Accept: */*
                                            User-Agent: Microsoft-CryptoAPI/10.0
                                            Host: ocsp.digicert.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Accept-Ranges: bytes
                                            Age: 2424
                                            Cache-Control: max-age=90965
                                            Content-Type: application/ocsp-response
                                            Date: Sat, 12 Feb 2022 00:37:38 GMT
                                            Etag: "6205b82f-1d7"
                                            Expires: Sun, 13 Feb 2022 01:53:43 GMT
                                            Last-Modified: Fri, 11 Feb 2022 01:13:19 GMT
                                            Server: ECS (amb/6B9B)
                                            X-Cache: HIT
                                            Content-Length: 471
                                          • 78.47.82.133:80
                                            http://www.sfml-dev.org/ip-provider.php
                                            http
                                            0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
                                            364 B
                                            829 B
                                            5
                                            5

                                            HTTP Request

                                            GET http://www.sfml-dev.org/ip-provider.php

                                            HTTP Response

                                            200
                                          • 172.98.203.175:80
                                            0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
                                            260 B
                                            5
                                          • 93.184.220.29:80
                                            crl4.digicert.com
                                            260 B
                                            5
                                          • 172.98.203.178:80
                                            0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
                                            260 B
                                            5
                                          • 93.184.220.29:80
                                            crl4.digicert.com
                                            260 B
                                            5
                                          • 93.184.220.29:80
                                            http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
                                            http
                                            466 B
                                            931 B
                                            5
                                            3

                                            HTTP Request

                                            GET http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D

                                            HTTP Response

                                            200
                                          • 10.127.1.158:8080
                                            0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
                                          • 93.184.220.29:80
                                            http://crl3.digicert.com/Omniroot2025.crl
                                            http
                                            456 B
                                            8.5kB
                                            7
                                            8

                                            HTTP Request

                                            GET http://crl3.digicert.com/Omniroot2025.crl

                                            HTTP Response

                                            200
                                          • 93.184.220.29:80
                                            http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D
                                            http
                                            424 B
                                            930 B
                                            4
                                            3

                                            HTTP Request

                                            GET http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D

                                            HTTP Response

                                            200
                                          • 8.8.8.8:53
                                            www.sfml-dev.org
                                            dns
                                            0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c.exe
                                            62 B
                                            92 B
                                            1
                                            1

                                            DNS Request

                                            www.sfml-dev.org

                                            DNS Response

                                            78.47.82.133

                                          • 8.8.8.8:53
                                            crl4.digicert.com
                                            dns
                                            63 B
                                            111 B
                                            1
                                            1

                                            DNS Request

                                            crl4.digicert.com

                                            DNS Response

                                            93.184.220.29

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          We care about your privacy.

                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.