Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 07:29
Static task
static1
Behavioral task
behavioral1
Sample
60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe
Resource
win10v2004-20220721-en
General
-
Target
60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe
-
Size
368KB
-
MD5
2a023356193bc07fb6fb08c7bf07aa8c
-
SHA1
555e3f3117f82a3b9a20512fd40aac3e232ee4ac
-
SHA256
60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14
-
SHA512
8c6579e8b94b6966424a86fd30920a6a9e12244ad7805c334e3b9d77decbdfcc9f73aa5fac226dc91daae7febc84e0571b00cf38d83c768f80735f7fa4aa3469
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 832 raorvrktxctd.exe 1668 raorvrktxctd.exe -
Deletes itself 1 IoCs
pid Process 888 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN raorvrktxctd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\ckkkfvb = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\raorvrktxctd.exe" raorvrktxctd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 856 set thread context of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 832 set thread context of 1668 832 raorvrktxctd.exe 31 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\raorvrktxctd.exe 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe File opened for modification C:\Windows\raorvrktxctd.exe 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1668 raorvrktxctd.exe 1668 raorvrktxctd.exe 1668 raorvrktxctd.exe 1668 raorvrktxctd.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe Token: SeDebugPrivilege 1668 raorvrktxctd.exe Token: SeIncreaseQuotaPrivilege 580 WMIC.exe Token: SeSecurityPrivilege 580 WMIC.exe Token: SeTakeOwnershipPrivilege 580 WMIC.exe Token: SeLoadDriverPrivilege 580 WMIC.exe Token: SeSystemProfilePrivilege 580 WMIC.exe Token: SeSystemtimePrivilege 580 WMIC.exe Token: SeProfSingleProcessPrivilege 580 WMIC.exe Token: SeIncBasePriorityPrivilege 580 WMIC.exe Token: SeCreatePagefilePrivilege 580 WMIC.exe Token: SeBackupPrivilege 580 WMIC.exe Token: SeRestorePrivilege 580 WMIC.exe Token: SeShutdownPrivilege 580 WMIC.exe Token: SeDebugPrivilege 580 WMIC.exe Token: SeSystemEnvironmentPrivilege 580 WMIC.exe Token: SeRemoteShutdownPrivilege 580 WMIC.exe Token: SeUndockPrivilege 580 WMIC.exe Token: SeManageVolumePrivilege 580 WMIC.exe Token: 33 580 WMIC.exe Token: 34 580 WMIC.exe Token: 35 580 WMIC.exe Token: SeIncreaseQuotaPrivilege 580 WMIC.exe Token: SeSecurityPrivilege 580 WMIC.exe Token: SeTakeOwnershipPrivilege 580 WMIC.exe Token: SeLoadDriverPrivilege 580 WMIC.exe Token: SeSystemProfilePrivilege 580 WMIC.exe Token: SeSystemtimePrivilege 580 WMIC.exe Token: SeProfSingleProcessPrivilege 580 WMIC.exe Token: SeIncBasePriorityPrivilege 580 WMIC.exe Token: SeCreatePagefilePrivilege 580 WMIC.exe Token: SeBackupPrivilege 580 WMIC.exe Token: SeRestorePrivilege 580 WMIC.exe Token: SeShutdownPrivilege 580 WMIC.exe Token: SeDebugPrivilege 580 WMIC.exe Token: SeSystemEnvironmentPrivilege 580 WMIC.exe Token: SeRemoteShutdownPrivilege 580 WMIC.exe Token: SeUndockPrivilege 580 WMIC.exe Token: SeManageVolumePrivilege 580 WMIC.exe Token: 33 580 WMIC.exe Token: 34 580 WMIC.exe Token: 35 580 WMIC.exe Token: SeBackupPrivilege 1712 vssvc.exe Token: SeRestorePrivilege 1712 vssvc.exe Token: SeAuditPrivilege 1712 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 856 wrote to memory of 1984 856 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 27 PID 1984 wrote to memory of 832 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 28 PID 1984 wrote to memory of 832 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 28 PID 1984 wrote to memory of 832 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 28 PID 1984 wrote to memory of 832 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 28 PID 1984 wrote to memory of 888 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 29 PID 1984 wrote to memory of 888 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 29 PID 1984 wrote to memory of 888 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 29 PID 1984 wrote to memory of 888 1984 60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe 29 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 832 wrote to memory of 1668 832 raorvrktxctd.exe 31 PID 1668 wrote to memory of 580 1668 raorvrktxctd.exe 32 PID 1668 wrote to memory of 580 1668 raorvrktxctd.exe 32 PID 1668 wrote to memory of 580 1668 raorvrktxctd.exe 32 PID 1668 wrote to memory of 580 1668 raorvrktxctd.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System raorvrktxctd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" raorvrktxctd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe"C:\Users\Admin\AppData\Local\Temp\60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe"C:\Users\Admin\AppData\Local\Temp\60087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\raorvrktxctd.exeC:\Windows\raorvrktxctd.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\raorvrktxctd.exeC:\Windows\raorvrktxctd.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1668 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\60087C~1.EXE3⤵
- Deletes itself
PID:888
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD52a023356193bc07fb6fb08c7bf07aa8c
SHA1555e3f3117f82a3b9a20512fd40aac3e232ee4ac
SHA25660087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14
SHA5128c6579e8b94b6966424a86fd30920a6a9e12244ad7805c334e3b9d77decbdfcc9f73aa5fac226dc91daae7febc84e0571b00cf38d83c768f80735f7fa4aa3469
-
Filesize
368KB
MD52a023356193bc07fb6fb08c7bf07aa8c
SHA1555e3f3117f82a3b9a20512fd40aac3e232ee4ac
SHA25660087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14
SHA5128c6579e8b94b6966424a86fd30920a6a9e12244ad7805c334e3b9d77decbdfcc9f73aa5fac226dc91daae7febc84e0571b00cf38d83c768f80735f7fa4aa3469
-
Filesize
368KB
MD52a023356193bc07fb6fb08c7bf07aa8c
SHA1555e3f3117f82a3b9a20512fd40aac3e232ee4ac
SHA25660087c3a5c83da4ccd11ca6716b351c3b29a2082d5cd0d8067122faa5389bf14
SHA5128c6579e8b94b6966424a86fd30920a6a9e12244ad7805c334e3b9d77decbdfcc9f73aa5fac226dc91daae7febc84e0571b00cf38d83c768f80735f7fa4aa3469