Analysis
-
max time kernel
4294180s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
22/03/2022, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
Resource
win10v2004-20220310-en
General
-
Target
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
-
Size
586KB
-
MD5
55b95e36469a3600abb995e58f61d4c9
-
SHA1
de6717493246599d8702e7d1fd6914aab5bd015d
-
SHA256
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a
-
SHA512
9b2eceff54340057b3eae7391b7c5205c3b2d6d13299b4b918fb1d1a5f6f1006079fc4c58b9dd589738927cf0580f5050c4e61448dd82a8d089f2ea9ddcb5e0a
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!-Recovery_Instructions-!.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\EnterHide.raw => C:\Users\Admin\Pictures\EnterHide.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\PublishSkip.tif => C:\Users\Admin\Pictures\PublishSkip.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\RequestUnpublish.raw => C:\Users\Admin\Pictures\RequestUnpublish.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\ResolveDeny.png => C:\Users\Admin\Pictures\ResolveDeny.png.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\UseRestore.png => C:\Users\Admin\Pictures\UseRestore.png.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\WriteExit.tif => C:\Users\Admin\Pictures\WriteExit.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\ConvertLock.tiff 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\ConvertLock.tiff => C:\Users\Admin\Pictures\ConvertLock.tiff.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Deletes itself 1 IoCs
pid Process 1108 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Links\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Music\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Music\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Documents\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Videos\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1152 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1016 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 576 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2016 vssvc.exe Token: SeRestorePrivilege 2016 vssvc.exe Token: SeAuditPrivilege 2016 vssvc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 576 wrote to memory of 1016 576 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 27 PID 576 wrote to memory of 1016 576 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 27 PID 576 wrote to memory of 1016 576 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 27 PID 576 wrote to memory of 1108 576 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 31 PID 576 wrote to memory of 1108 576 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 31 PID 576 wrote to memory of 1108 576 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 31 PID 1108 wrote to memory of 1152 1108 cmd.exe 34 PID 1108 wrote to memory of 1152 1108 cmd.exe 34 PID 1108 wrote to memory of 1152 1108 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe"C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1016
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe" >> NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1152
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016