Analysis
-
max time kernel
151s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 17:45
Static task
static1
Behavioral task
behavioral1
Sample
3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe
Resource
win10v2004-20220414-en
General
-
Target
3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe
-
Size
410KB
-
MD5
80dc3c416941c3d8955fd132d29d2500
-
SHA1
5800d69fbb28e74b7683bdfcc2d230095e44e996
-
SHA256
3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a
-
SHA512
ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\RECOVERoutwt.txt
http://kkr4hbwdklf234bfl84uoqleflqwrfqwuelfh.brazabaya.com/228D5240A2F4AE2A
http://974gfbjhb23hbfkyfaby3byqlyuebvly5q254y.mendilobo.com/228D5240A2F4AE2A
http://a64gfdsjhb4htbiwaysbdvukyft5q.zobodine.at/228D5240A2F4AE2A
http://k7tlx3ghr3m4n2tu.onion/228D5240A2F4AE2A
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
gxebyv.exegxebyv.exepid Process 940 gxebyv.exe 536 gxebyv.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1220 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exepid Process 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exegxebyv.exedescription pid Process procid_target PID 1544 set thread context of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 940 set thread context of 536 940 gxebyv.exe 32 -
Drops file in Program Files directory 2 IoCs
Processes:
gxebyv.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\af.txt gxebyv.exe File opened for modification C:\Program Files\7-Zip\History.txt gxebyv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 656 vssadmin.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
gxebyv.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\trueimg gxebyv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gxebyv.exepid Process 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe 536 gxebyv.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
gxebyv.exevssvc.exedescription pid Process Token: SeDebugPrivilege 536 gxebyv.exe Token: SeBackupPrivilege 2004 vssvc.exe Token: SeRestorePrivilege 2004 vssvc.exe Token: SeAuditPrivilege 2004 vssvc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exegxebyv.exegxebyv.exedescription pid Process procid_target PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1544 wrote to memory of 1476 1544 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 28 PID 1476 wrote to memory of 940 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 29 PID 1476 wrote to memory of 940 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 29 PID 1476 wrote to memory of 940 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 29 PID 1476 wrote to memory of 940 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 29 PID 1476 wrote to memory of 1220 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 30 PID 1476 wrote to memory of 1220 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 30 PID 1476 wrote to memory of 1220 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 30 PID 1476 wrote to memory of 1220 1476 3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe 30 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 940 wrote to memory of 536 940 gxebyv.exe 32 PID 536 wrote to memory of 656 536 gxebyv.exe 33 PID 536 wrote to memory of 656 536 gxebyv.exe 33 PID 536 wrote to memory of 656 536 gxebyv.exe 33 PID 536 wrote to memory of 656 536 gxebyv.exe 33 PID 536 wrote to memory of 1972 536 gxebyv.exe 37 PID 536 wrote to memory of 1972 536 gxebyv.exe 37 PID 536 wrote to memory of 1972 536 gxebyv.exe 37 PID 536 wrote to memory of 1972 536 gxebyv.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe"C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe"C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\Documents\gxebyv.exeC:\Users\Admin\Documents\gxebyv.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\Documents\gxebyv.exeC:\Users\Admin\Documents\gxebyv.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
PID:656
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\tvcgy.bat5⤵PID:1972
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\3921CB~1.EXE >> NUL3⤵
- Deletes itself
PID:1220
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410KB
MD580dc3c416941c3d8955fd132d29d2500
SHA15800d69fbb28e74b7683bdfcc2d230095e44e996
SHA2563921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a
SHA512ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247
-
Filesize
410KB
MD580dc3c416941c3d8955fd132d29d2500
SHA15800d69fbb28e74b7683bdfcc2d230095e44e996
SHA2563921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a
SHA512ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247
-
Filesize
410KB
MD580dc3c416941c3d8955fd132d29d2500
SHA15800d69fbb28e74b7683bdfcc2d230095e44e996
SHA2563921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a
SHA512ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247
-
Filesize
410KB
MD580dc3c416941c3d8955fd132d29d2500
SHA15800d69fbb28e74b7683bdfcc2d230095e44e996
SHA2563921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a
SHA512ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247
-
Filesize
410KB
MD580dc3c416941c3d8955fd132d29d2500
SHA15800d69fbb28e74b7683bdfcc2d230095e44e996
SHA2563921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a
SHA512ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247