Analysis
-
max time kernel
4294183s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
14-03-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe
Resource
win10v2004-en-20220113
General
-
Target
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe
-
Size
5.4MB
-
MD5
4f7adc32ec67c1a55853ef828fe58707
-
SHA1
36de7997949ac3b9b456023fb072b9a8cd84ade8
-
SHA256
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b
-
SHA512
a45e4a20133c842037789157c3ed845afdefbb0d2fe3958d75f0cb3cdfeee106262f9de0e0aca92ac84a0211432cd19773e0f769b970ddb8a80e5f7855676f74
Malware Config
Extracted
C:\HowToRestoreYourFiles.txt
rook
Signatures
-
Rook
Rook is a ransomware which copies from NightSky ransomware.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 24 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\UpdateCompare.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\DenySwitch.tif.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\GroupSelect.crw => C:\Users\Admin\Pictures\GroupSelect.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\RestartRemove.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\SplitRepair.tiff 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\WriteUse.tiff 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\SplitRepair.tiff => C:\Users\Admin\Pictures\SplitRepair.tiff.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\TestUse.tif => C:\Users\Admin\Pictures\TestUse.tif.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\WatchRead.png.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\RestartRemove.crw => C:\Users\Admin\Pictures\RestartRemove.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\SplitRepair.tiff.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\UpdateCompare.raw => C:\Users\Admin\Pictures\UpdateCompare.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\ClearPublish.raw => C:\Users\Admin\Pictures\ClearPublish.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\DenySwitch.tif => C:\Users\Admin\Pictures\DenySwitch.tif.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\DismountSet.raw => C:\Users\Admin\Pictures\DismountSet.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\InvokeCopy.crw => C:\Users\Admin\Pictures\InvokeCopy.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\InvokeCopy.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\WatchRead.png => C:\Users\Admin\Pictures\WatchRead.png.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\WriteUse.tiff.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\ClearPublish.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\DismountSet.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\GroupSelect.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\TestUse.tif.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\WriteUse.tiff => C:\Users\Admin\Pictures\WriteUse.tiff.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe -
Processes:
resource yara_rule behavioral1/memory/628-54-0x000000013F1F0000-0x000000013FB0D000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exedescription ioc Process File opened (read-only) \??\E: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\R: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\I: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\P: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\G: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\L: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\Z: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\V: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\B: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\Q: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\O: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\A: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\J: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\K: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\M: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\W: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\S: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\F: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\T: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\Y: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\U: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\H: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\X: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\N: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 1660 vssadmin.exe 804 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exepid Process 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid Process Token: SeBackupPrivilege 1924 vssvc.exe Token: SeRestorePrivilege 1924 vssvc.exe Token: SeAuditPrivilege 1924 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.execmd.execmd.exedescription pid Process procid_target PID 628 wrote to memory of 664 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 28 PID 628 wrote to memory of 664 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 28 PID 628 wrote to memory of 664 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 28 PID 664 wrote to memory of 1660 664 cmd.exe 30 PID 664 wrote to memory of 1660 664 cmd.exe 30 PID 664 wrote to memory of 1660 664 cmd.exe 30 PID 628 wrote to memory of 1232 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 35 PID 628 wrote to memory of 1232 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 35 PID 628 wrote to memory of 1232 628 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 35 PID 1232 wrote to memory of 804 1232 cmd.exe 36 PID 1232 wrote to memory of 804 1232 cmd.exe 36 PID 1232 wrote to memory of 804 1232 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe"C:\Users\Admin\AppData\Local\Temp\96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:804
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924