Analysis
-
max time kernel
84s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 07:07
Static task
static1
Behavioral task
behavioral1
Sample
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe
Resource
win10v2004-20220721-en
General
-
Target
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe
-
Size
86KB
-
MD5
a3bd9be795f3bb86cc5f9cfdafe63174
-
SHA1
1e74684bdbafb21b4a742ab436f2372dd87e2c10
-
SHA256
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a
-
SHA512
7220c614c7d42f563e0d9777a4dd8023430e53eb4aa3e260668545999051f46ea64a267694da734cba553a4716923b72d5d74867014211a744faf064f23a23f7
Malware Config
Extracted
pony
http://spiko2004.ru/api/index.php
Signatures
-
CrypVault
Ransomware family which makes encrypted files look like they have been quarantined by AV.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 1820 cmd.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 268 bcdedit.exe 1800 bcdedit.exe -
Drops startup file 2 IoCs
Processes:
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VAULT.hta a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VAULT.hta a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1740 vssadmin.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exepid process 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exeWMIC.exevssvc.exedescription pid process Token: SeImpersonatePrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeTcbPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeChangeNotifyPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeCreateTokenPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeBackupPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeRestorePrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeIncreaseQuotaPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeAssignPrimaryTokenPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeIncreaseQuotaPrivilege 584 WMIC.exe Token: SeSecurityPrivilege 584 WMIC.exe Token: SeTakeOwnershipPrivilege 584 WMIC.exe Token: SeLoadDriverPrivilege 584 WMIC.exe Token: SeSystemProfilePrivilege 584 WMIC.exe Token: SeSystemtimePrivilege 584 WMIC.exe Token: SeProfSingleProcessPrivilege 584 WMIC.exe Token: SeIncBasePriorityPrivilege 584 WMIC.exe Token: SeCreatePagefilePrivilege 584 WMIC.exe Token: SeBackupPrivilege 584 WMIC.exe Token: SeRestorePrivilege 584 WMIC.exe Token: SeShutdownPrivilege 584 WMIC.exe Token: SeDebugPrivilege 584 WMIC.exe Token: SeSystemEnvironmentPrivilege 584 WMIC.exe Token: SeRemoteShutdownPrivilege 584 WMIC.exe Token: SeUndockPrivilege 584 WMIC.exe Token: SeManageVolumePrivilege 584 WMIC.exe Token: 33 584 WMIC.exe Token: 34 584 WMIC.exe Token: 35 584 WMIC.exe Token: SeIncreaseQuotaPrivilege 584 WMIC.exe Token: SeSecurityPrivilege 584 WMIC.exe Token: SeTakeOwnershipPrivilege 584 WMIC.exe Token: SeLoadDriverPrivilege 584 WMIC.exe Token: SeSystemProfilePrivilege 584 WMIC.exe Token: SeSystemtimePrivilege 584 WMIC.exe Token: SeProfSingleProcessPrivilege 584 WMIC.exe Token: SeIncBasePriorityPrivilege 584 WMIC.exe Token: SeCreatePagefilePrivilege 584 WMIC.exe Token: SeBackupPrivilege 584 WMIC.exe Token: SeRestorePrivilege 584 WMIC.exe Token: SeShutdownPrivilege 584 WMIC.exe Token: SeDebugPrivilege 584 WMIC.exe Token: SeSystemEnvironmentPrivilege 584 WMIC.exe Token: SeRemoteShutdownPrivilege 584 WMIC.exe Token: SeUndockPrivilege 584 WMIC.exe Token: SeManageVolumePrivilege 584 WMIC.exe Token: 33 584 WMIC.exe Token: 34 584 WMIC.exe Token: 35 584 WMIC.exe Token: SeBackupPrivilege 1108 vssvc.exe Token: SeRestorePrivilege 1108 vssvc.exe Token: SeAuditPrivilege 1108 vssvc.exe Token: SeImpersonatePrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeTcbPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeChangeNotifyPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeCreateTokenPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeBackupPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeRestorePrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeIncreaseQuotaPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeAssignPrimaryTokenPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeImpersonatePrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeTcbPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeChangeNotifyPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeCreateTokenPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe Token: SeBackupPrivilege 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.execmd.exedescription pid process target process PID 1900 wrote to memory of 1676 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe mshta.exe PID 1900 wrote to memory of 1676 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe mshta.exe PID 1900 wrote to memory of 1676 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe mshta.exe PID 1900 wrote to memory of 1676 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe mshta.exe PID 1900 wrote to memory of 584 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe WMIC.exe PID 1900 wrote to memory of 584 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe WMIC.exe PID 1900 wrote to memory of 584 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe WMIC.exe PID 1900 wrote to memory of 584 1900 a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe WMIC.exe PID 1692 wrote to memory of 1740 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 1740 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 1740 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 268 1692 cmd.exe bcdedit.exe PID 1692 wrote to memory of 268 1692 cmd.exe bcdedit.exe PID 1692 wrote to memory of 268 1692 cmd.exe bcdedit.exe PID 1692 wrote to memory of 1800 1692 cmd.exe bcdedit.exe PID 1692 wrote to memory of 1800 1692 cmd.exe bcdedit.exe PID 1692 wrote to memory of 1800 1692 cmd.exe bcdedit.exe -
outlook_win_path 1 IoCs
Processes:
a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe"C:\Users\Admin\AppData\Local\Temp\a038550b84921c092cb4bbaf4cd9e6ff2183b6e866a6f7b1d62403afa042110a.exe"1⤵
- Drops startup file
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1900 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\VAULT.hta"2⤵
- Modifies Internet Explorer settings
PID:1676
-
-
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" process call create "cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\system32\cmd.execmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1740
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:268
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1800
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d4b7e4b65820162201a4eb151ffc1287
SHA10f62132fb3e7aa7b493495a148c8acd09c778fe1
SHA256c29577456ecc544510f669aceb6e966c4561971449ae1c95f880f77bd4f388b1
SHA512fbf9ed1cbf4eae4babf18f33a9a93dbd4d9bb4e3918eb32102476d29ca587698c1aa79ceede225684eee647171b9486ef6f27716be012a1ae8f9bfb60c7458ce