Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
18-03-2022 20:38
Static task
static1
Behavioral task
behavioral1
Sample
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe
Resource
win10v2004-en-20220113
General
-
Target
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe
-
Size
170KB
-
MD5
bec9b3480934ce3d30c25e1272f60d02
-
SHA1
104d9e31e34ba8517f701552594f1fc167550964
-
SHA256
f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789
-
SHA512
99ebdaf100af272678b92cdb0743cdb6a1b4a8ecc83a1fb3127dfc53bf609a655715bf9ee3a4a7dbee7ae21cb5ff98283772d9bf5641e394b7e3c21a1010cdbc
Malware Config
Extracted
C:\HowToRestoreYourFiles.txt
rook
Signatures
-
Rook
Rook is a ransomware which copies from NightSky ransomware.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 22 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exedescription ioc Process File renamed C:\Users\Admin\Pictures\LockImport.tif => C:\Users\Admin\Pictures\LockImport.tif.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\DismountClear.tiff.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\ExportMove.tif => C:\Users\Admin\Pictures\ExportMove.tif.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\RemoveRegister.crw => C:\Users\Admin\Pictures\RemoveRegister.crw.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\LockImport.tif.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\RenameProtect.raw => C:\Users\Admin\Pictures\RenameProtect.raw.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\RegisterGroup.raw => C:\Users\Admin\Pictures\RegisterGroup.raw.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\RestoreLock.png.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\ConvertToLimit.png => C:\Users\Admin\Pictures\ConvertToLimit.png.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\RegisterGroup.raw.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\RemoveRegister.crw.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\RenameProtect.raw.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\UnlockBackup.tiff.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\DismountClear.tiff => C:\Users\Admin\Pictures\DismountClear.tiff.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\ConvertToLimit.png.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\DisableSave.png => C:\Users\Admin\Pictures\DisableSave.png.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\DisableSave.png.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\ExportMove.tif.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\UnlockBackup.tiff Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\RestoreLock.png => C:\Users\Admin\Pictures\RestoreLock.png.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File renamed C:\Users\Admin\Pictures\UnlockBackup.tiff => C:\Users\Admin\Pictures\UnlockBackup.tiff.Rook Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened for modification C:\Users\Admin\Pictures\DismountClear.tiff Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe -
Deletes itself 1 IoCs
Processes:
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exepid Process 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exedescription ioc Process File opened (read-only) \??\H: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\B: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\N: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\Q: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\E: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\U: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\O: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\P: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\W: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\R: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\T: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\I: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\K: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\X: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\V: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\Y: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\A: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\F: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\J: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\L: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\S: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\G: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\Z: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe File opened (read-only) \??\M: Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 3132 vssadmin.exe 1260 vssadmin.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exepid Process 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exepid Process 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid Process Token: SeBackupPrivilege 484 vssvc.exe Token: SeRestorePrivilege 484 vssvc.exe Token: SeAuditPrivilege 484 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
NOTEPAD.EXEnotepad.exepid Process 2856 NOTEPAD.EXE 3588 notepad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.execmd.execmd.exedescription pid Process procid_target PID 1272 wrote to memory of 1220 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe 80 PID 1272 wrote to memory of 1220 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe 80 PID 1220 wrote to memory of 3132 1220 cmd.exe 82 PID 1220 wrote to memory of 3132 1220 cmd.exe 82 PID 1272 wrote to memory of 4740 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe 87 PID 1272 wrote to memory of 4740 1272 Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe 87 PID 4740 wrote to memory of 1260 4740 cmd.exe 89 PID 4740 wrote to memory of 1260 4740 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe"C:\Users\Admin\AppData\Local\Temp\Rook_f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1260
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:484
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:3356
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Network Shortcuts\HowToRestoreYourFiles.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:2856
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:3588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
00f71cde522689585eaa9c62385afa22
SHA1350e319806f7a71267a5e4a749eb190ead38dbb0
SHA256b14ec2fcccac5059464e800edf56049c0277124abd60ee49c1f726861df925bf
SHA51247442d335f16e259c4593370467c741ac2b41f329330afdd649b89b44c4233edd7d2af70883403993d6022c617235c20b89ae667ca4b3f82d678836adc34f4df
-
MD5
d74ec27d01fa0906eaf948a68f9d8a7c
SHA1408c8e55248f86b11920426b9d0889c4e6cbc7cb
SHA25609158d2389dfe3df5ae64de68089364595b614fd3fafdcd0c0f9cc370777bc6b
SHA512d24ddaa0f21492cdb0e5b7f2be4346ecf2c0cdbdabdf65fdcacbf5529389466a1409713231a2f3de0b3a20f549add7b6ecba4412d5695b73c267c168f121544d