Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
22-03-2022 12:54
Static task
static1
Behavioral task
behavioral1
Sample
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
Resource
win10v2004-20220310-en
General
-
Target
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe
-
Size
586KB
-
MD5
55b95e36469a3600abb995e58f61d4c9
-
SHA1
de6717493246599d8702e7d1fd6914aab5bd015d
-
SHA256
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a
-
SHA512
9b2eceff54340057b3eae7391b7c5205c3b2d6d13299b4b918fb1d1a5f6f1006079fc4c58b9dd589738927cf0580f5050c4e61448dd82a8d089f2ea9ddcb5e0a
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!-Recovery_Instructions-!.txt
restoreassistance_net@wholeness.business
restoreassistance_net@decorous.cyou
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exedescription ioc process File renamed C:\Users\Admin\Pictures\CheckpointRegister.tif => C:\Users\Admin\Pictures\CheckpointRegister.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\GetApprove.raw => C:\Users\Admin\Pictures\GetApprove.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\ShowMerge.tif => C:\Users\Admin\Pictures\ShowMerge.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\UnpublishPop.raw => C:\Users\Admin\Pictures\UnpublishPop.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\WriteRepair.png => C:\Users\Admin\Pictures\WriteRepair.png.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\CloseSwitch.tif => C:\Users\Admin\Pictures\CloseSwitch.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\MeasureCopy.crw => C:\Users\Admin\Pictures\MeasureCopy.crw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\RevokeClose.tif => C:\Users\Admin\Pictures\RevokeClose.tif.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\SaveUnprotect.png => C:\Users\Admin\Pictures\SaveUnprotect.png.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\SubmitDisconnect.raw => C:\Users\Admin\Pictures\SubmitDisconnect.raw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File renamed C:\Users\Admin\Pictures\WaitSave.crw => C:\Users\Admin\Pictures\WaitSave.crw.SunnyDay 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Drops desktop.ini file(s) 25 IoCs
Processes:
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exedescription ioc process File opened for modification C:\Users\Public\AccountPictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Documents\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Music\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Links\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Music\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Public\Videos\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Drops file in Windows directory 23 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITCA20.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITCA8E.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT3053.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT316E.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT3374.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITC934.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\f3535a3b47819a04c6d5ee18905493be086e801e svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT29E8.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\F2WKV54ysEMEW9U+EfiUeJcNcgfNL4pMC5NmE0a3mAg= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BIT3401.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BIT3942.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BITCAAE.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITD127.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT2A76.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\9+dL4Puh6FM8puPxsBEX86BMeGqpuC0b7gf2fD9DLLo= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BIT3100.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BIT318E.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\af66e12c1bb9d8519da21259d0fcd88c247cb4f1 svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\Cmn5TH6S2lFFnfMN8MLr2EoNUIAGzQo2UUjHGMEC99A= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\5ondRmJ90JlkPETuN535TWk= svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\e1a85885fd4453165061351651289cce8f8590c4 svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BIT23CD.tmp svchost.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\612ad442b8740f4c57b8c84e6bf465ba4699118c svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2244 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 5076 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exepid process 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2748 vssvc.exe Token: SeRestorePrivilege 2748 vssvc.exe Token: SeAuditPrivilege 2748 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.execmd.exedescription pid process target process PID 1916 wrote to memory of 5076 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe vssadmin.exe PID 1916 wrote to memory of 5076 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe vssadmin.exe PID 1916 wrote to memory of 3168 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe cmd.exe PID 1916 wrote to memory of 3168 1916 7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe cmd.exe PID 3168 wrote to memory of 2244 3168 cmd.exe timeout.exe PID 3168 wrote to memory of 2244 3168 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe"C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\7862d6e083c5792c40a6a570c1d3824ddab12cebc902ea965393fe057b717c0a.exe" >> NUL2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Drops file in Windows directory
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv vnmZEoxk7k6Jz+G579WJCg.01⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/556-134-0x00000151AB740000-0x00000151AB750000-memory.dmpFilesize
64KB
-
memory/556-135-0x00000151AB7A0000-0x00000151AB7B0000-memory.dmpFilesize
64KB
-
memory/556-136-0x00000151AE620000-0x00000151AE621000-memory.dmpFilesize
4KB
-
memory/556-137-0x00000151AE6C0000-0x00000151AE6C4000-memory.dmpFilesize
16KB
-
memory/556-138-0x00000151AE6C0000-0x00000151AE6C4000-memory.dmpFilesize
16KB
-
memory/556-139-0x00000151AE810000-0x00000151AE814000-memory.dmpFilesize
16KB
-
memory/556-140-0x00000151AE810000-0x00000151AE814000-memory.dmpFilesize
16KB
-
memory/556-141-0x00000151AE780000-0x00000151AE784000-memory.dmpFilesize
16KB
-
memory/556-142-0x00000151AECE0000-0x00000151AECE4000-memory.dmpFilesize
16KB
-
memory/556-143-0x00000151AECE0000-0x00000151AECE4000-memory.dmpFilesize
16KB