Analysis
-
max time kernel
4294210s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
05-03-2022 15:37
Static task
static1
Behavioral task
behavioral1
Sample
05a6fca52556551b286603a139394bfb6526c8f5d87929f1ed68908b7a76a623.dll
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
05a6fca52556551b286603a139394bfb6526c8f5d87929f1ed68908b7a76a623.dll
Resource
win10v2004-en-20220112
General
-
Target
05a6fca52556551b286603a139394bfb6526c8f5d87929f1ed68908b7a76a623.dll
-
Size
212KB
-
MD5
25a0c625ef34156e73a69a477e80a6e8
-
SHA1
2bb975338e4ed4f24aaaa231b161bcb228a2bc3f
-
SHA256
05a6fca52556551b286603a139394bfb6526c8f5d87929f1ed68908b7a76a623
-
SHA512
b5822c9f05240cb41ef69ec0fe3ba38f12389b6507e256b39905749ecd951617904d94b9ea0006c6cfd52e7aec64e93fa85a5a16ff26c06791a0d37e2aad805e
Malware Config
Extracted
C:\RECOVERY DATA INFORMATION.TXT
balaclava
Signatures
-
Balaclava Malware
Balaclava malware is a ransomware program.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\F: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\Q: rundll32.exe -
Drops file in Program Files directory 64 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Program Files\RemoveRestore.wav.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\7z.sfx rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt rundll32.exe File opened for modification C:\Program Files\CompareSend.pptm rundll32.exe File opened for modification C:\Program Files\ResumeUnlock.M2V.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt rundll32.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BlackRectangle.bmp rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\SetRevoke.vst rundll32.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt rundll32.exe File opened for modification C:\Program Files\DenySync.tiff.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\SearchEdit.ram.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\SplitOpen.easmx rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\DVD Maker\soniccolorconverter.ax rundll32.exe File opened for modification C:\Program Files\ConvertToSelect.bmp.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\ReadBlock.xls.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\RepairUnpublish.aifc rundll32.exe File opened for modification C:\Program Files\ResumeSwitch.tmp rundll32.exe File opened for modification C:\Program Files\CloseEnable.ocx.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\DVD Maker\offset.ax rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt rundll32.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_ButtonGraphic.png rundll32.exe File opened for modification C:\Program Files\LimitConvert.wax.82A-AA9-7B6 rundll32.exe File created C:\Program Files\7-Zip\Lang\RECOVERY DATA INFORMATION.TXT rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\CloseEnable.ocx rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\DVD Maker\it-IT\OmdProject.dll.mui rundll32.exe File opened for modification C:\Program Files\BackupRepair.pot.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt.82A-AA9-7B6 rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt rundll32.exe File opened for modification C:\Program Files\ExportRename.scf rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt rundll32.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png rundll32.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 988 vssadmin.exe 1992 vssadmin.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exevssvc.exedescription pid process Token: SeIncreaseQuotaPrivilege 536 WMIC.exe Token: SeSecurityPrivilege 536 WMIC.exe Token: SeTakeOwnershipPrivilege 536 WMIC.exe Token: SeLoadDriverPrivilege 536 WMIC.exe Token: SeSystemProfilePrivilege 536 WMIC.exe Token: SeSystemtimePrivilege 536 WMIC.exe Token: SeProfSingleProcessPrivilege 536 WMIC.exe Token: SeIncBasePriorityPrivilege 536 WMIC.exe Token: SeCreatePagefilePrivilege 536 WMIC.exe Token: SeBackupPrivilege 536 WMIC.exe Token: SeRestorePrivilege 536 WMIC.exe Token: SeShutdownPrivilege 536 WMIC.exe Token: SeDebugPrivilege 536 WMIC.exe Token: SeSystemEnvironmentPrivilege 536 WMIC.exe Token: SeRemoteShutdownPrivilege 536 WMIC.exe Token: SeUndockPrivilege 536 WMIC.exe Token: SeManageVolumePrivilege 536 WMIC.exe Token: 33 536 WMIC.exe Token: 34 536 WMIC.exe Token: 35 536 WMIC.exe Token: SeIncreaseQuotaPrivilege 1780 WMIC.exe Token: SeSecurityPrivilege 1780 WMIC.exe Token: SeTakeOwnershipPrivilege 1780 WMIC.exe Token: SeLoadDriverPrivilege 1780 WMIC.exe Token: SeSystemProfilePrivilege 1780 WMIC.exe Token: SeSystemtimePrivilege 1780 WMIC.exe Token: SeProfSingleProcessPrivilege 1780 WMIC.exe Token: SeIncBasePriorityPrivilege 1780 WMIC.exe Token: SeCreatePagefilePrivilege 1780 WMIC.exe Token: SeBackupPrivilege 1780 WMIC.exe Token: SeRestorePrivilege 1780 WMIC.exe Token: SeShutdownPrivilege 1780 WMIC.exe Token: SeDebugPrivilege 1780 WMIC.exe Token: SeSystemEnvironmentPrivilege 1780 WMIC.exe Token: SeRemoteShutdownPrivilege 1780 WMIC.exe Token: SeUndockPrivilege 1780 WMIC.exe Token: SeManageVolumePrivilege 1780 WMIC.exe Token: 33 1780 WMIC.exe Token: 34 1780 WMIC.exe Token: 35 1780 WMIC.exe Token: SeBackupPrivilege 1572 vssvc.exe Token: SeRestorePrivilege 1572 vssvc.exe Token: SeAuditPrivilege 1572 vssvc.exe Token: SeIncreaseQuotaPrivilege 1780 WMIC.exe Token: SeSecurityPrivilege 1780 WMIC.exe Token: SeTakeOwnershipPrivilege 1780 WMIC.exe Token: SeLoadDriverPrivilege 1780 WMIC.exe Token: SeSystemProfilePrivilege 1780 WMIC.exe Token: SeSystemtimePrivilege 1780 WMIC.exe Token: SeProfSingleProcessPrivilege 1780 WMIC.exe Token: SeIncBasePriorityPrivilege 1780 WMIC.exe Token: SeCreatePagefilePrivilege 1780 WMIC.exe Token: SeBackupPrivilege 1780 WMIC.exe Token: SeRestorePrivilege 1780 WMIC.exe Token: SeShutdownPrivilege 1780 WMIC.exe Token: SeDebugPrivilege 1780 WMIC.exe Token: SeSystemEnvironmentPrivilege 1780 WMIC.exe Token: SeRemoteShutdownPrivilege 1780 WMIC.exe Token: SeUndockPrivilege 1780 WMIC.exe Token: SeManageVolumePrivilege 1780 WMIC.exe Token: 33 1780 WMIC.exe Token: 34 1780 WMIC.exe Token: 35 1780 WMIC.exe Token: SeIncreaseQuotaPrivilege 536 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1712 wrote to memory of 1952 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1952 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1952 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1952 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1952 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1952 1712 rundll32.exe rundll32.exe PID 1712 wrote to memory of 1952 1712 rundll32.exe rundll32.exe PID 1952 wrote to memory of 1956 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1956 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1956 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1956 1952 rundll32.exe cmd.exe PID 1956 wrote to memory of 1120 1956 cmd.exe chcp.com PID 1956 wrote to memory of 1120 1956 cmd.exe chcp.com PID 1956 wrote to memory of 1120 1956 cmd.exe chcp.com PID 1956 wrote to memory of 1120 1956 cmd.exe chcp.com PID 1956 wrote to memory of 1804 1956 cmd.exe net.exe PID 1956 wrote to memory of 1804 1956 cmd.exe net.exe PID 1956 wrote to memory of 1804 1956 cmd.exe net.exe PID 1956 wrote to memory of 1804 1956 cmd.exe net.exe PID 1952 wrote to memory of 584 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 584 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 584 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 584 1952 rundll32.exe cmd.exe PID 584 wrote to memory of 1460 584 cmd.exe chcp.com PID 584 wrote to memory of 1460 584 cmd.exe chcp.com PID 584 wrote to memory of 1460 584 cmd.exe chcp.com PID 584 wrote to memory of 1460 584 cmd.exe chcp.com PID 584 wrote to memory of 1976 584 cmd.exe net.exe PID 584 wrote to memory of 1976 584 cmd.exe net.exe PID 584 wrote to memory of 1976 584 cmd.exe net.exe PID 584 wrote to memory of 1976 584 cmd.exe net.exe PID 1952 wrote to memory of 728 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 728 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 728 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 728 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1832 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1832 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1832 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1832 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 432 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 432 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 432 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 432 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1928 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1928 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1928 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 1928 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2000 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2000 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2000 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2000 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2028 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2028 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2028 1952 rundll32.exe cmd.exe PID 1952 wrote to memory of 2028 1952 rundll32.exe cmd.exe PID 728 wrote to memory of 536 728 cmd.exe WMIC.exe PID 728 wrote to memory of 536 728 cmd.exe WMIC.exe PID 728 wrote to memory of 536 728 cmd.exe WMIC.exe PID 728 wrote to memory of 536 728 cmd.exe WMIC.exe PID 2000 wrote to memory of 988 2000 cmd.exe vssadmin.exe PID 2000 wrote to memory of 988 2000 cmd.exe vssadmin.exe PID 2000 wrote to memory of 988 2000 cmd.exe vssadmin.exe PID 2000 wrote to memory of 988 2000 cmd.exe vssadmin.exe PID 2028 wrote to memory of 1780 2028 cmd.exe WMIC.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05a6fca52556551b286603a139394bfb6526c8f5d87929f1ed68908b7a76a623.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05a6fca52556551b286603a139394bfb6526c8f5d87929f1ed68908b7a76a623.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chcp 1250 && net view3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\chcp.comchcp 12504⤵PID:1120
-
-
C:\Windows\SysWOW64\net.exenet view4⤵
- Discovers systems in the same network
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chcp 1250 && net view "\\GZAATBZA"3⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\chcp.comchcp 12504⤵PID:1460
-
-
C:\Windows\SysWOW64\net.exenet view "\\GZAATBZA"4⤵
- Discovers systems in the same network
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:1832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:1928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:988
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1992
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
78215698f8f9dc7941c9c287642bd02c
SHA1633cd0a6c76f080cdb6e0c98034b0b5dd7283a47
SHA256dc94e21e80522b2cee097064c31a7720d70a02d0c55f290d59030fd0c995cac5
SHA512c0a05f8cc400855c40b8e8eb3e7f027b06553cc592eb2ab6ad0a8c33ed2d196c7eda358977edc3f34ce1fdbff30efe288725eb10ea463e622ee9eb8085e48f7d