Analysis

  • max time kernel
    125s
  • max time network
    80s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 06:06

General

  • Target

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe

  • Size

    382KB

  • MD5

    432ad4941c057927786e3b6646ecf2f3

  • SHA1

    45babe449954544219054e327523de5812597eaa

  • SHA256

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

  • SHA512

    8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3

Malware Config

Signatures

  • Cerber 2 IoCs

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • suricata: ET MALWARE Ransomware/Cerber Checkin 2

    suricata: ET MALWARE Ransomware/Cerber Checkin 2

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Contacts a large (514) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe
    "C:\Users\Admin\AppData\Local\Temp\5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe"
    1⤵
    • Cerber
    • Modifies visiblity of hidden/system files in Explorer
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Roaming\{42265351-17C5-8579-D85E-5A3545A2D848}\RunLegacyCPLElevated.exe
      "C:\Users\Admin\AppData\Roaming\{42265351-17C5-8579-D85E-5A3545A2D848}\RunLegacyCPLElevated.exe"
      2⤵
      • Cerber
      • Modifies visiblity of hidden/system files in Explorer
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:472
      • C:\Windows\system32\vssadmin.exe
        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1664
      • C:\Windows\system32\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1504
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1456
    • C:\Windows\SysWOW64\cmd.exe
      /d /c taskkill /f /im "5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe" > NUL
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im "5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100.exe"
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1156
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 1 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:636
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1868

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

3
T1112

File Deletion

2
T1107

Credential Access

Credentials in Files

1
T1081

Discovery

Network Service Scanning

1
T1046

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

3
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UANRNN0F\json[1].json
    Filesize

    302B

    MD5

    8e05f3c0db548fd239a695579aee88d5

    SHA1

    61bca21b1c2ca5e1f381d78e700750b5b70e4232

    SHA256

    c8e544e4519ee3dcfbebd98b060c640bd9d5327ac9b263ecae5449e0e502adc3

    SHA512

    e352dd9dc53f9fdb226a5bc79ccbd1d741fa36e1c151f9169b585de9629bb94637ed1f6da158998b44556f07bd54a3a1673aeff340c87248e142204ee8ddb9cb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\RunLegacyCPLElevated.lnk
    Filesize

    1KB

    MD5

    a35cf85f1370b6b5da9949bc4c31c246

    SHA1

    a680ec09d12d64edc716ae3b8346f9cf026f77dc

    SHA256

    5adbcbc225fb4da7bcdc889b5409474ce9046f888379e921d9438b9b9fabe91a

    SHA512

    46510626ea3e968fa0c198644fe3c3e100a09fad934ebe1ad2b14b53c9325b9b2ff75662510f57c35033ab991de70387e030946fc9e10ab130bf808bd38f0470

  • C:\Users\Admin\AppData\Roaming\{42265351-17C5-8579-D85E-5A3545A2D848}\RunLegacyCPLElevated.exe
    Filesize

    382KB

    MD5

    432ad4941c057927786e3b6646ecf2f3

    SHA1

    45babe449954544219054e327523de5812597eaa

    SHA256

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

    SHA512

    8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3

  • C:\Users\Admin\AppData\Roaming\{42265351-17C5-8579-D85E-5A3545A2D848}\RunLegacyCPLElevated.exe
    Filesize

    382KB

    MD5

    432ad4941c057927786e3b6646ecf2f3

    SHA1

    45babe449954544219054e327523de5812597eaa

    SHA256

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

    SHA512

    8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3

  • \Users\Admin\AppData\Roaming\{42265351-17C5-8579-D85E-5A3545A2D848}\RunLegacyCPLElevated.exe
    Filesize

    382KB

    MD5

    432ad4941c057927786e3b6646ecf2f3

    SHA1

    45babe449954544219054e327523de5812597eaa

    SHA256

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

    SHA512

    8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3

  • \Users\Admin\AppData\Roaming\{42265351-17C5-8579-D85E-5A3545A2D848}\RunLegacyCPLElevated.exe
    Filesize

    382KB

    MD5

    432ad4941c057927786e3b6646ecf2f3

    SHA1

    45babe449954544219054e327523de5812597eaa

    SHA256

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

    SHA512

    8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3

  • memory/472-74-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/472-58-0x0000000000000000-mapping.dmp
  • memory/472-67-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/580-62-0x0000000000000000-mapping.dmp
  • memory/636-66-0x0000000000000000-mapping.dmp
  • memory/1156-65-0x0000000000000000-mapping.dmp
  • memory/1456-72-0x0000000000000000-mapping.dmp
  • memory/1504-71-0x0000000000000000-mapping.dmp
  • memory/1564-54-0x00000000763E1000-0x00000000763E3000-memory.dmp
    Filesize

    8KB

  • memory/1564-63-0x0000000000400000-0x000000000043A000-memory.dmp
    Filesize

    232KB

  • memory/1564-55-0x0000000000270000-0x00000000002A5000-memory.dmp
    Filesize

    212KB

  • memory/1564-56-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/1664-69-0x0000000000000000-mapping.dmp
  • memory/1764-70-0x0000000000000000-mapping.dmp