Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 21:06
Static task
static1
Behavioral task
behavioral1
Sample
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe
Resource
win10v2004-20220414-en
General
-
Target
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe
-
Size
220KB
-
MD5
adc3438992114c797a33b0a2ed415185
-
SHA1
568979d0548bef3a113fd03f75b6d1c64aa4e0d9
-
SHA256
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb
-
SHA512
1f3d7551ee1621641b98da20dbc6444e6845af5fdc63f04339c5ab4a5d57fe12465e328edc91fd57c87c9ce64da89a0c8cbf155d0a3214d9a03c395812bfebf0
Malware Config
Extracted
C:\Restore_My_Files.txt
http://vbfqeh5nugm6r2u2qvghsdxm3fotf5wbxb5ltv6vw77vus5frdpuaiid.onion*
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\DebugUnlock.tiff => C:\Users\Admin\Pictures\DebugUnlock.tiff.pandora 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File renamed C:\Users\Admin\Pictures\ExitUnregister.tif => C:\Users\Admin\Pictures\ExitUnregister.tif.pandora 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File renamed C:\Users\Admin\Pictures\MeasureSelect.png => C:\Users\Admin\Pictures\MeasureSelect.png.pandora 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File renamed C:\Users\Admin\Pictures\StopPush.png => C:\Users\Admin\Pictures\StopPush.png.pandora 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened for modification C:\Users\Admin\Pictures\DebugUnlock.tiff 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\X: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\Q: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\S: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\F: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\H: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\K: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\L: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\N: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\E: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\R: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\I: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\O: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\G: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\V: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\W: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\T: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\U: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\P: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\J: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\Y: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\A: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\B: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe File opened (read-only) \??\M: 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2044 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe Token: SeBackupPrivilege 1832 vssvc.exe Token: SeRestorePrivilege 1832 vssvc.exe Token: SeAuditPrivilege 1832 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1980 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 29 PID 1648 wrote to memory of 1980 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 29 PID 1648 wrote to memory of 1980 1648 627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe 29 PID 1980 wrote to memory of 2044 1980 cmd.exe 31 PID 1980 wrote to memory of 2044 1980 cmd.exe 31 PID 1980 wrote to memory of 2044 1980 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe"C:\Users\Admin\AppData\Local\Temp\627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2044
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1832