Analysis

  • max time kernel
    152s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-07-2022 01:54

General

  • Target

    48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867.exe

  • Size

    756KB

  • MD5

    8fb63c10eb2c656dafe47e854906d29b

  • SHA1

    ae45c8e53bbc6e094e12c44bad0da44eb357ca36

  • SHA256

    48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867

  • SHA512

    baa533df470d47aacb6274c193bc34ddace60957dbcddc39aa130cb11b74ec7ce25d051347c80c19a10ddfab854595b52c8a88b35134eb8b79ae177b49688718

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867.exe
    "C:\Users\Admin\AppData\Local\Temp\48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867.exe"
    1⤵
    • Modifies extensions of user files
    • Suspicious use of AdjustPrivilegeToken
    PID:1556
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1708
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7CC012D3-9E83-4050-821B-1D8572778302} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All
      2⤵
      • Interacts with shadow copies
      PID:1656

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Impact

Inhibit System Recovery

2
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1556-54-0x0000000075541000-0x0000000075543000-memory.dmp
    Filesize

    8KB

  • memory/1556-55-0x0000000000AB0000-0x0000000000B71000-memory.dmp
    Filesize

    772KB

  • memory/1556-58-0x0000000000870000-0x00000000008F9000-memory.dmp
    Filesize

    548KB

  • memory/1656-59-0x0000000000000000-mapping.dmp