Analysis

  • max time kernel
    163s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-06-2022 03:19

General

  • Target

    1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe

  • Size

    164KB

  • MD5

    5f2d13576e4906501c91b8bf400e0890

  • SHA1

    adff2761a6afe9ecaa70486c0a04746c676a133b

  • SHA256

    1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2

  • SHA512

    29186d7c1702ab738844777a780ce982882727d8fb3ae6e1fd084bffef3ac63fcd7ca4624ee9bf047c909c303deece27f81650b1309280d6609d207e29131dfd

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
    "C:\Users\Admin\AppData\Local\Temp\1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
      C:\Users\Admin\AppData\Local\Temp\1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:3520
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C net stop vss
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3288
        • C:\Windows\SysWOW64\net.exe
          net stop vss
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4284
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop vss
            5⤵
              PID:3216
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /All
          3⤵
            PID:4156
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4216
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic shadowcopy delete
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1508
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Y: /All
            3⤵
              PID:4308
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Z: /All
              3⤵
                PID:4652
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=X: /All
                3⤵
                  PID:3620
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=W: /All
                  3⤵
                    PID:4432
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=V: /All
                    3⤵
                      PID:4312
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=U: /All
                      3⤵
                        PID:1352
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=T: /All
                        3⤵
                          PID:4996
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=S: /All
                          3⤵
                            PID:3972
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=R: /All
                            3⤵
                              PID:176
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Q: /All
                              3⤵
                                PID:4876
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=P: /All
                                3⤵
                                  PID:1124
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=O: /All
                                  3⤵
                                    PID:4008
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=N: /All
                                    3⤵
                                      PID:2328
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=M: /All
                                      3⤵
                                        PID:3452
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=L: /All
                                        3⤵
                                          PID:1248
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=K: /All
                                          3⤵
                                            PID:2512
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=J: /All
                                            3⤵
                                              PID:4832
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=I: /All
                                              3⤵
                                                PID:648
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=H: /All
                                                3⤵
                                                  PID:3820
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=G: /All
                                                  3⤵
                                                    PID:4564
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=F: /All
                                                    3⤵
                                                      PID:2680
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=E: /All
                                                      3⤵
                                                        PID:3016
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=D: /All
                                                        3⤵
                                                          PID:4444
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=C: /All
                                                          3⤵
                                                            PID:2184
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=B: /All
                                                            3⤵
                                                              PID:4924
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=A: /All
                                                              3⤵
                                                                PID:3636
                                                          • C:\Windows\system32\vssvc.exe
                                                            C:\Windows\system32\vssvc.exe
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2464

                                                          Network

                                                          MITRE ATT&CK Enterprise v6

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • memory/176-148-0x0000000000000000-mapping.dmp

                                                          • memory/648-157-0x0000000000000000-mapping.dmp

                                                          • memory/1124-150-0x0000000000000000-mapping.dmp

                                                          • memory/1248-154-0x0000000000000000-mapping.dmp

                                                          • memory/1352-144-0x0000000000000000-mapping.dmp

                                                          • memory/1508-146-0x0000000000000000-mapping.dmp

                                                          • memory/2184-163-0x0000000000000000-mapping.dmp

                                                          • memory/2328-152-0x0000000000000000-mapping.dmp

                                                          • memory/2512-155-0x0000000000000000-mapping.dmp

                                                          • memory/2680-160-0x0000000000000000-mapping.dmp

                                                          • memory/3016-161-0x0000000000000000-mapping.dmp

                                                          • memory/3216-140-0x0000000000000000-mapping.dmp

                                                          • memory/3288-134-0x0000000000000000-mapping.dmp

                                                          • memory/3452-153-0x0000000000000000-mapping.dmp

                                                          • memory/3520-131-0x0000000000400000-0x0000000000978000-memory.dmp

                                                            Filesize

                                                            5.5MB

                                                          • memory/3520-130-0x0000000000000000-mapping.dmp

                                                          • memory/3520-166-0x0000000000400000-0x000000000040E000-memory.dmp

                                                            Filesize

                                                            56KB

                                                          • memory/3520-133-0x0000000000400000-0x000000000040E000-memory.dmp

                                                            Filesize

                                                            56KB

                                                          • memory/3620-141-0x0000000000000000-mapping.dmp

                                                          • memory/3636-165-0x0000000000000000-mapping.dmp

                                                          • memory/3820-158-0x0000000000000000-mapping.dmp

                                                          • memory/3972-147-0x0000000000000000-mapping.dmp

                                                          • memory/3992-132-0x0000000002330000-0x0000000002335000-memory.dmp

                                                            Filesize

                                                            20KB

                                                          • memory/4008-151-0x0000000000000000-mapping.dmp

                                                          • memory/4156-135-0x0000000000000000-mapping.dmp

                                                          • memory/4216-136-0x0000000000000000-mapping.dmp

                                                          • memory/4284-137-0x0000000000000000-mapping.dmp

                                                          • memory/4308-139-0x0000000000000000-mapping.dmp

                                                          • memory/4312-143-0x0000000000000000-mapping.dmp

                                                          • memory/4432-142-0x0000000000000000-mapping.dmp

                                                          • memory/4444-162-0x0000000000000000-mapping.dmp

                                                          • memory/4564-159-0x0000000000000000-mapping.dmp

                                                          • memory/4652-138-0x0000000000000000-mapping.dmp

                                                          • memory/4832-156-0x0000000000000000-mapping.dmp

                                                          • memory/4876-149-0x0000000000000000-mapping.dmp

                                                          • memory/4924-164-0x0000000000000000-mapping.dmp

                                                          • memory/4996-145-0x0000000000000000-mapping.dmp