Analysis
-
max time kernel
144s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 03:04
Static task
static1
Behavioral task
behavioral1
Sample
jhdsgvc74.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
jhdsgvc74.exe
Resource
win10v2004-20220414-en
General
-
Target
jhdsgvc74.exe
-
Size
654KB
-
MD5
693ef59145aa6b9e329f91538855ef64
-
SHA1
e3067d7c7227af026c0abfbdf7b417c4e294f380
-
SHA256
3a810cbad7296f83122c4a16b935a723d8019419069a55c939d93c246abed2ac
-
SHA512
3f0ad7a869823d63d1867f4bf2322e88a909324bab80e7e6d8906237db0aea669326030f16a337980681cfd94c86a955ccb2747ff41be0bf75da112a53693a6b
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\DebugUnlock.tiff jhdsgvc74.exe -
Deletes itself 1 IoCs
pid Process 1908 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\ykcol.bmp" jhdsgvc74.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1140 vssadmin.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\Desktop\TileWallpaper = "0" jhdsgvc74.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\Desktop\WallpaperStyle = "0" jhdsgvc74.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000850f07ecb424934d8f5a48a59e73cec000000000020000000000106600000001000020000000983365a17b44c5700ef79cca8c163ecf296d230da778cbb5867dd20a9e174d95000000000e8000000002000020000000b30c3320b7f9d4e87afda83a3a3ee241d3d862c0a5b1cc9f354d3b90aca6d54c2000000035ecb753d8bd0437e12ec74cbfd4893016e74f5118e6bbcf9499609dd91f5f36400000004c23a6a0023f8645b3b528097a1599017e0dbdded5a09b64353b25448e86be1b15ab0d422740db4201b8df98e490527b5e44f084760ab48623f9c31698371a08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2053d0baaf95d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E45B7491-01A2-11ED-AFC1-4E0428891AFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2036 vssvc.exe Token: SeRestorePrivilege 2036 vssvc.exe Token: SeAuditPrivilege 2036 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 788 iexplore.exe 1616 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 788 iexplore.exe 788 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 748 wrote to memory of 1140 748 taskeng.exe 31 PID 748 wrote to memory of 1140 748 taskeng.exe 31 PID 748 wrote to memory of 1140 748 taskeng.exe 31 PID 1976 wrote to memory of 788 1976 jhdsgvc74.exe 35 PID 1976 wrote to memory of 788 1976 jhdsgvc74.exe 35 PID 1976 wrote to memory of 788 1976 jhdsgvc74.exe 35 PID 1976 wrote to memory of 788 1976 jhdsgvc74.exe 35 PID 1976 wrote to memory of 1908 1976 jhdsgvc74.exe 39 PID 1976 wrote to memory of 1908 1976 jhdsgvc74.exe 39 PID 1976 wrote to memory of 1908 1976 jhdsgvc74.exe 39 PID 1976 wrote to memory of 1908 1976 jhdsgvc74.exe 39 PID 788 wrote to memory of 1820 788 iexplore.exe 41 PID 788 wrote to memory of 1820 788 iexplore.exe 41 PID 788 wrote to memory of 1820 788 iexplore.exe 41 PID 788 wrote to memory of 1820 788 iexplore.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\jhdsgvc74.exe"C:\Users\Admin\AppData\Local\Temp\jhdsgvc74.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ykcol.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:788 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\jhdsgvc74.exe"2⤵
- Deletes itself
PID:1908
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
C:\Windows\system32\taskeng.exetaskeng.exe {F2A9614E-B49B-40B6-A41A-E8C39864C1EF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All2⤵
- Interacts with shadow copies
PID:1140
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5b2e02d7dfe91d736b572839525463934
SHA1e5b1eb8ac1ea43b1ade161a3f35d27c225ef85d7
SHA2568346fb664f8147ef84abd158f9b7be8ca9403210e904b422628ffcda7f780801
SHA51243da87f0ed77f925622e5e82786d83bd5c9e23831c66e8a290db84a792768a426d8db66a0caa48780bc874673cc61f8ca828c1695833b1547f805acc1d1e76e3
-
Filesize
8KB
MD59543a7ab7ca42d857b9a7e8d6e31f288
SHA146014116615dbe68e3c1e8247dd5fd1bd3ebe5f7
SHA256b81265670f12788a2902e998f9302f2e485c068d6fb8cfa8e8e3d78fd4d838a9
SHA5120696c8893669b3183c239c5e2da366205b0e54f022b7d4defe4b67e538d48f0067c55504a8a8190e9c9e7f086f431975732970a14b0be83bb4cb7357c0029414