Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
22/03/2022, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
Resource
win10v2004-20220310-en
General
-
Target
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
-
Size
586KB
-
MD5
55b95e36469a3600abb995e58f61d4c9
-
SHA1
de6717493246599d8702e7d1fd6914aab5bd015d
-
SHA256
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a
-
SHA512
9b2eceff54340057b3eae7391b7c5205c3b2d6d13299b4b918fb1d1a5f6f1006079fc4c58b9dd589738927cf0580f5050c4e61448dd82a8d089f2ea9ddcb5e0a
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!-Recovery_Instructions-!.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CheckpointRegister.tif => C:\Users\Admin\Pictures\CheckpointRegister.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\GetApprove.raw => C:\Users\Admin\Pictures\GetApprove.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\ShowMerge.tif => C:\Users\Admin\Pictures\ShowMerge.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\UnpublishPop.raw => C:\Users\Admin\Pictures\UnpublishPop.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\WriteRepair.png => C:\Users\Admin\Pictures\WriteRepair.png.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\CloseSwitch.tif => C:\Users\Admin\Pictures\CloseSwitch.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\MeasureCopy.crw => C:\Users\Admin\Pictures\MeasureCopy.crw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\RevokeClose.tif => C:\Users\Admin\Pictures\RevokeClose.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\SaveUnprotect.png => C:\Users\Admin\Pictures\SaveUnprotect.png.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\SubmitDisconnect.raw => C:\Users\Admin\Pictures\SubmitDisconnect.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\WaitSave.crw => C:\Users\Admin\Pictures\WaitSave.crw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Drops desktop.ini file(s) 25 IoCs
description ioc Process File opened for modification C:\Users\Public\AccountPictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Documents\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Music\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Links\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Music\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Videos\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Drops file in Windows directory 23 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITCA20.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITCA8E.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT3053.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT316E.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT3374.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITC934.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\f3535a3b47819a04c6d5ee18905493be086e801e svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT29E8.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\F2WKV54ysEMEW9U+EfiUeJcNcgfNL4pMC5NmE0a3mAg= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT3401.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BIT3942.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BITCAAE.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITD127.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT2A76.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\9+dL4Puh6FM8puPxsBEX86BMeGqpuC0b7gf2fD9DLLo= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BIT3100.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BIT318E.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\af66e12c1bb9d8519da21259d0fcd88c247cb4f1 svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\Cmn5TH6S2lFFnfMN8MLr2EoNUIAGzQo2UUjHGMEC99A= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\5ondRmJ90JlkPETuN535TWk= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\e1a85885fd4453165061351651289cce8f8590c4 svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BIT23CD.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\612ad442b8740f4c57b8c84e6bf465ba4699118c svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 2244 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5076 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2748 vssvc.exe Token: SeRestorePrivilege 2748 vssvc.exe Token: SeAuditPrivilege 2748 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1916 wrote to memory of 5076 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 85 PID 1916 wrote to memory of 5076 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 85 PID 1916 wrote to memory of 3168 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 90 PID 1916 wrote to memory of 3168 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 90 PID 3168 wrote to memory of 2244 3168 cmd.exe 92 PID 3168 wrote to memory of 2244 3168 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe"C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:5076
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2244
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Drops file in Windows directory
PID:556
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv vnmZEoxk7k6Jz+G579WJCg.01⤵PID:1632