Overview
overview
10Static
static
1036c3-malwa.../1.exe
windows7_x64
1036c3-malwa.../1.exe
windows10-2004_x64
1036c3-malwa...86.exe
windows7_x64
1036c3-malwa...86.exe
windows10-2004_x64
1036c3-malwa...52.dll
windows7_x64
136c3-malwa...52.dll
windows10-2004_x64
636c3-malwa...V2.exe
windows7_x64
1036c3-malwa...V2.exe
windows10-2004_x64
1036c3-malwa....9.exe
windows7_x64
1036c3-malwa....9.exe
windows10-2004_x64
1036c3-malwa...aa.exe
windows7_x64
1036c3-malwa...aa.exe
windows10-2004_x64
1036c3-malwa...ty.exe
windows7_x64
1036c3-malwa...ty.exe
windows10-2004_x64
10Analysis
-
max time kernel
124s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 02:44
Static task
static1
Behavioral task
behavioral1
Sample
36c3-malwarexchg-part3/1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
36c3-malwarexchg-part3/1.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
36c3-malwarexchg-part3/5oaxnx86.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
36c3-malwarexchg-part3/5oaxnx86.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
36c3-malwarexchg-part3/6cb6fda0b353d411a30c5b945e53ea52.dll
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
36c3-malwarexchg-part3/6cb6fda0b353d411a30c5b945e53ea52.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
36c3-malwarexchg-part3/DR_V2.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
36c3-malwarexchg-part3/DR_V2.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
36c3-malwarexchg-part3/GandCrabV5.0.9.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
36c3-malwarexchg-part3/GandCrabV5.0.9.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
36c3-malwarexchg-part3/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
36c3-malwarexchg-part3/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
36c3-malwarexchg-part3/pinebook-sality.exe
Resource
win7-20220414-en
General
-
Target
36c3-malwarexchg-part3/DR_V2.exe
-
Size
201KB
-
MD5
4ba2e1d4cf7a86753f9f8174b3bc74c8
-
SHA1
742128fab2ad05f8f52a4c6f43b39a25fcc161a6
-
SHA256
66ee3840a9722d3912b73e477d1a11fd0e5468769ba17e5e71873fd519e76def
-
SHA512
83a596cdeec0c9560436ec8f10b5368ffc6c62a060e5fe3dcb628f3b76c2b659f57b0b9782c28b7f992e71aa9590b55ac622a38ef4ff33892129cb551346ef6e
Malware Config
Extracted
C:\Documents and Settings\read_me.txt
1J9CG9KtJZVx1dHsVcSu8cxMTbLsqeXM5N
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ResumeUnpublish.tiff DR_V2.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Videos\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Desktop\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Libraries\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Documents\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Music\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Music\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Videos\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Searches\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Downloads\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Pictures\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Links\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Documents\desktop.ini DR_V2.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini DR_V2.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini DR_V2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 1652 vssvc.exe Token: SeRestorePrivilege 1652 vssvc.exe Token: SeAuditPrivilege 1652 vssvc.exe Token: 33 664 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 664 AUDIODG.EXE Token: 33 664 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 664 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\36c3-malwarexchg-part3\DR_V2.exe"C:\Users\Admin\AppData\Local\Temp\36c3-malwarexchg-part3\DR_V2.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
PID:972
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:664