Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 22:09

General

  • Target

    f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe

  • Size

    554KB

  • MD5

    3ad90c3efdecc0984b6e4b6b411151e5

  • SHA1

    422506ddf8fa1a1056173309e1c42343b2adebb7

  • SHA256

    f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1

  • SHA512

    f37f5110595f4e86e50671300567622e942648bb0f479529c0e15350d4b4fc58854fa54d1dea445569450828039d23d7c3e7221b2fc9a839c7e9e85e78ae6a2d

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe
    "C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe
      "C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe"
      2⤵
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\system32\explorer.exe"
        3⤵
        • Adds Run key to start application
        • Drops file in Windows directory
        • Modifies Internet Explorer Phishing Filter
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\SysWOW64\vssadmin.exe
          vssadmin.exe Delete Shadows /All /Quiet
          4⤵
          • Interacts with shadow copies
          PID:1944
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ywynugoxasijikec\01000000

    Filesize

    554KB

    MD5

    2d601ef3e9c58772c9f767ebad2f4822

    SHA1

    d6f4fa5f7707c09083f0f40797ab036ff885cbfb

    SHA256

    d06aaad109f8c4329bca028d0451bdbdd68eb8fdc1c0396843d75f9a88c52a45

    SHA512

    9c389a5f9971a98628e98ab6b33948ade3173c0f11a445493260f67f5eed571e47e57dfe888e06b7464bc3534c346a3e82e605290063c18eef7daa168d849fcd

  • memory/784-54-0x0000000076391000-0x0000000076393000-memory.dmp

    Filesize

    8KB

  • memory/1880-66-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-77-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-61-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-62-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-65-0x000000000040A61E-mapping.dmp

  • memory/1880-64-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-58-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-68-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-60-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1880-55-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1944-78-0x0000000000000000-mapping.dmp

  • memory/2000-73-0x000000000009A160-mapping.dmp

  • memory/2000-75-0x0000000075051000-0x0000000075053000-memory.dmp

    Filesize

    8KB

  • memory/2000-71-0x0000000000080000-0x00000000000BC000-memory.dmp

    Filesize

    240KB

  • memory/2000-69-0x0000000000080000-0x00000000000BC000-memory.dmp

    Filesize

    240KB

  • memory/2000-79-0x0000000000080000-0x00000000000BC000-memory.dmp

    Filesize

    240KB

  • memory/2000-80-0x0000000072CA1000-0x0000000072CA3000-memory.dmp

    Filesize

    8KB