Analysis

  • max time kernel
    162s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    07-06-2022 18:28

General

  • Target

    a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe

  • Size

    62KB

  • MD5

    131a20e9f579bc9f7dd9832b4c5f25bd

  • SHA1

    83979db718962e3a0b45e5f70320fe5b4f009b7c

  • SHA256

    a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154

  • SHA512

    92e83892f635efb13d6f268ccab884b2079451a82a1e53a8482c632e126b14d3453c5ab17463d55b4cd2341d6b44034eb523867258932a9cd47deba435494f1c

Score
9/10

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 14 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe
    "C:\Users\Admin\AppData\Local\Temp\a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Windows\SYSTEM32\net.exe
      "net.exe" stop avpsus /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4836
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stop avpsus /y
        3⤵
          PID:4484
      • C:\Windows\SYSTEM32\net.exe
        "net.exe" stop McAfeeDLPAgentService /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3880
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop McAfeeDLPAgentService /y
          3⤵
            PID:3520
        • C:\Windows\SYSTEM32\net.exe
          "net.exe" stop mfewc /y
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4576
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop mfewc /y
            3⤵
              PID:4476
          • C:\Windows\SYSTEM32\net.exe
            "net.exe" stop BMR Boot Service /y
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4548
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop BMR Boot Service /y
              3⤵
                PID:3260
            • C:\Windows\SYSTEM32\net.exe
              "net.exe" stop NetBackup BMR MTFTP Service /y
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3516
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y
                3⤵
                  PID:1508
              • C:\Windows\SYSTEM32\sc.exe
                "sc.exe" config SQLTELEMETRY start= disabled
                2⤵
                • Launches sc.exe
                PID:3228
              • C:\Windows\SYSTEM32\sc.exe
                "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                2⤵
                • Launches sc.exe
                PID:2284
              • C:\Windows\SYSTEM32\sc.exe
                "sc.exe" config SQLWriter start= disabled
                2⤵
                • Launches sc.exe
                PID:780
              • C:\Windows\SYSTEM32\sc.exe
                "sc.exe" config SstpSvc start= disabled
                2⤵
                • Launches sc.exe
                PID:2576
              • C:\Windows\SYSTEM32\taskkill.exe
                "taskkill.exe" /IM mspub.exe /F
                2⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1228
              • C:\Windows\SYSTEM32\taskkill.exe
                "taskkill.exe" /IM mydesktopqos.exe /F
                2⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:204
              • C:\Windows\SYSTEM32\taskkill.exe
                "taskkill.exe" /IM mydesktopservice.exe /F
                2⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4004
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" Delete Shadows /all /quiet
                2⤵
                • Interacts with shadow copies
                PID:3784
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB
                2⤵
                • Interacts with shadow copies
                PID:2304
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded
                2⤵
                • Interacts with shadow copies
                PID:2316
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:2728
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:4060
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:4312
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:3660
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:4296
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:2532
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:1572
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:3256
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:1836
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded
                2⤵
                • Enumerates connected drives
                • Interacts with shadow copies
                PID:2204
              • C:\Windows\SYSTEM32\vssadmin.exe
                "vssadmin.exe" Delete Shadows /all /quiet
                2⤵
                • Interacts with shadow copies
                PID:692
              • C:\Windows\SYSTEM32\arp.exe
                "arp" -a
                2⤵
                  PID:3120
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4076

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Defense Evasion

              File Deletion

              2
              T1107

              Discovery

              Query Registry

              1
              T1012

              Peripheral Device Discovery

              1
              T1120

              System Information Discovery

              2
              T1082

              Command and Control

              Web Service

              1
              T1102

              Impact

              Inhibit System Recovery

              2
              T1490

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/204-147-0x0000000000000000-mapping.dmp
              • memory/692-162-0x0000000000000000-mapping.dmp
              • memory/780-144-0x0000000000000000-mapping.dmp
              • memory/1228-146-0x0000000000000000-mapping.dmp
              • memory/1508-141-0x0000000000000000-mapping.dmp
              • memory/1572-158-0x0000000000000000-mapping.dmp
              • memory/1836-160-0x0000000000000000-mapping.dmp
              • memory/2204-161-0x0000000000000000-mapping.dmp
              • memory/2284-143-0x0000000000000000-mapping.dmp
              • memory/2304-150-0x0000000000000000-mapping.dmp
              • memory/2316-151-0x0000000000000000-mapping.dmp
              • memory/2532-157-0x0000000000000000-mapping.dmp
              • memory/2576-145-0x0000000000000000-mapping.dmp
              • memory/2728-152-0x0000000000000000-mapping.dmp
              • memory/3120-163-0x0000000000000000-mapping.dmp
              • memory/3228-142-0x0000000000000000-mapping.dmp
              • memory/3256-159-0x0000000000000000-mapping.dmp
              • memory/3260-139-0x0000000000000000-mapping.dmp
              • memory/3516-140-0x0000000000000000-mapping.dmp
              • memory/3520-135-0x0000000000000000-mapping.dmp
              • memory/3660-155-0x0000000000000000-mapping.dmp
              • memory/3784-149-0x0000000000000000-mapping.dmp
              • memory/3880-134-0x0000000000000000-mapping.dmp
              • memory/3892-133-0x00007FFAE0AF0000-0x00007FFAE15B1000-memory.dmp
                Filesize

                10.8MB

              • memory/3892-164-0x00007FFAE0AF0000-0x00007FFAE15B1000-memory.dmp
                Filesize

                10.8MB

              • memory/3892-130-0x0000000000C30000-0x0000000000C46000-memory.dmp
                Filesize

                88KB

              • memory/4004-148-0x0000000000000000-mapping.dmp
              • memory/4060-153-0x0000000000000000-mapping.dmp
              • memory/4296-156-0x0000000000000000-mapping.dmp
              • memory/4312-154-0x0000000000000000-mapping.dmp
              • memory/4476-137-0x0000000000000000-mapping.dmp
              • memory/4484-132-0x0000000000000000-mapping.dmp
              • memory/4548-138-0x0000000000000000-mapping.dmp
              • memory/4576-136-0x0000000000000000-mapping.dmp
              • memory/4836-131-0x0000000000000000-mapping.dmp