Analysis

  • max time kernel
    40s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    06-07-2022 04:46

General

  • Target

    PCShredder.exe

  • Size

    14.7MB

  • MD5

    96cb05530c60082172543f1011fd9d48

  • SHA1

    3ab9dcd4b109432656b36afa1f8f264d43d43273

  • SHA256

    918567fd880fe414ae41ebca386cfafe8b114369ce8002fa2d9420b5495576c8

  • SHA512

    e6fd8493dee16e771dccc892cd0941cac676fbd2f23cd589350101df3d9c307dcbc3b7e66181f9cc83662da9a455ea5172392485e351754bc775743d90cb7c90

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 47 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PCShredder.exe
    "C:\Users\Admin\AppData\Local\Temp\PCShredder.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k vssadmin.exe delete shadows /all /quiet && exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:3756
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k reagentc.exe /disable && exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\system32\ReAgentc.exe
        reagentc.exe /disable
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:4976
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /k reg delete HKCR /f && exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\system32\reg.exe
        reg delete HKCR /f
        3⤵
        • Modifies system executable filetype association
        • Registers COM server for autorun
        • Modifies registry class
        PID:228
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4980

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

File Deletion

2
T1107

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Desktop\as.lnk
    Filesize

    2KB

    MD5

    596c1f64c7faf04e5c26ff53955feec3

    SHA1

    150f1074c8b7cda388aef768425b945eca07b177

    SHA256

    8a635fd63133bb7c743209b185651e3d304ccce1bd3f55d068b250ac85231ec5

    SHA512

    7ae4e1b746f14613ca9c977066fc21d93ed3f71cc395ec6890da61770b798e01e677c6be5f398441c4fe243ac3591baddc117cff0afe1160c916be4dd18cd660

  • memory/228-138-0x0000000000000000-mapping.dmp
  • memory/516-135-0x0000000000000000-mapping.dmp
  • memory/1732-133-0x0000000000000000-mapping.dmp
  • memory/3756-134-0x0000000000000000-mapping.dmp
  • memory/3764-130-0x000001D238880000-0x000001D239732000-memory.dmp
    Filesize

    14.7MB

  • memory/3764-131-0x00007FFF9AFE0000-0x00007FFF9BAA1000-memory.dmp
    Filesize

    10.8MB

  • memory/3764-132-0x00007FFF9AFE0000-0x00007FFF9BAA1000-memory.dmp
    Filesize

    10.8MB

  • memory/4580-137-0x0000000000000000-mapping.dmp
  • memory/4976-136-0x0000000000000000-mapping.dmp