Analysis
-
max time kernel
127s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14-03-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe
Resource
win10v2004-en-20220113
General
-
Target
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe
-
Size
5.4MB
-
MD5
4f7adc32ec67c1a55853ef828fe58707
-
SHA1
36de7997949ac3b9b456023fb072b9a8cd84ade8
-
SHA256
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b
-
SHA512
a45e4a20133c842037789157c3ed845afdefbb0d2fe3958d75f0cb3cdfeee106262f9de0e0aca92ac84a0211432cd19773e0f769b970ddb8a80e5f7855676f74
Malware Config
Extracted
C:\Documents and Settings\HowToRestoreYourFiles.txt
rook
Signatures
-
Rook
Rook is a ransomware which copies from NightSky ransomware.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 17 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\EditDisconnect.tiff.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\LimitJoin.crw => C:\Users\Admin\Pictures\LimitJoin.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\LimitJoin.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\OptimizeBlock.png.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\CopySwitch.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\EditDisconnect.tiff => C:\Users\Admin\Pictures\EditDisconnect.tiff.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\ExportTrace.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\ClearRemove.crw => C:\Users\Admin\Pictures\ClearRemove.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\ExportTrace.raw => C:\Users\Admin\Pictures\ExportTrace.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\FindUnpublish.raw => C:\Users\Admin\Pictures\FindUnpublish.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\FindUnpublish.raw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\OptimizeBlock.png => C:\Users\Admin\Pictures\OptimizeBlock.png.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\ResolveDeny.png => C:\Users\Admin\Pictures\ResolveDeny.png.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\ResolveDeny.png.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\EditDisconnect.tiff 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened for modification C:\Users\Admin\Pictures\ClearRemove.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File renamed C:\Users\Admin\Pictures\CopySwitch.crw => C:\Users\Admin\Pictures\CopySwitch.crw.Rook 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe -
Processes:
resource yara_rule behavioral2/memory/664-130-0x00007FF756550000-0x00007FF756E6D000-memory.dmp vmprotect behavioral2/memory/664-133-0x00007FF756550000-0x00007FF756E6D000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exedescription ioc Process File opened (read-only) \??\Q: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\S: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\F: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\J: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\M: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\E: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\Y: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\U: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\G: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\L: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\X: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\N: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\R: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\T: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\O: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\A: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\H: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\K: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\Z: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\V: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\W: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\I: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\P: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe File opened (read-only) \??\B: 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 2828 vssadmin.exe 3776 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exepid Process 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid Process Token: SeBackupPrivilege 4388 vssvc.exe Token: SeRestorePrivilege 4388 vssvc.exe Token: SeAuditPrivilege 4388 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.execmd.execmd.exedescription pid Process procid_target PID 664 wrote to memory of 4856 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 82 PID 664 wrote to memory of 4856 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 82 PID 4856 wrote to memory of 2828 4856 cmd.exe 84 PID 4856 wrote to memory of 2828 4856 cmd.exe 84 PID 664 wrote to memory of 1800 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 89 PID 664 wrote to memory of 1800 664 96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe 89 PID 1800 wrote to memory of 3776 1800 cmd.exe 91 PID 1800 wrote to memory of 3776 1800 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe"C:\Users\Admin\AppData\Local\Temp\96f7df1c984c1753289600f7f373f3a98a4f09f82acc1be8ecfd5790763a355b.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3776
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4388