Analysis
-
max time kernel
168s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 10:11
Behavioral task
behavioral1
Sample
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe
Resource
win10v2004-20220812-en
General
-
Target
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe
-
Size
42KB
-
MD5
c84a88c6676ad0d3c8330c8d95324e1d
-
SHA1
4f2277a86825bba3917290fd95416210c5ca6a4a
-
SHA256
78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7
-
SHA512
4df47dffa0e1be95ac7c33f5d4707abaf24a20224262f3ced41f06b79696d2d83cb8d175f7112c004ff1a5e05d7c5ad40dededd786be33e7b9672c30ed84230a
-
SSDEEP
768:8O1oR/YVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzD8hOT11+2p1tK5v6:8ES1FKnDtkuIm8S82HMy
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 612 wbadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwritash.dat 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mip.exe.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tabskb.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkObj.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipBand.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipTsf.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tipresx.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\readme.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\descript.ion 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipTsf.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\FlickLearningWizard.exe.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipRes.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-changjei.xml 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrusalm.dat 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcatsh.dat 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IpsMigrationPlugin.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrenclm.dat 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\rtscom.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipRes.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipTsf.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InputPersonalization.exe.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IPSEventLogMsg.dll.mui 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1744 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1112 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2004 vssvc.exe Token: SeRestorePrivilege 2004 vssvc.exe Token: SeAuditPrivilege 2004 vssvc.exe Token: SeBackupPrivilege 1952 wbengine.exe Token: SeRestorePrivilege 1952 wbengine.exe Token: SeSecurityPrivilege 1952 wbengine.exe Token: SeIncreaseQuotaPrivilege 1544 WMIC.exe Token: SeSecurityPrivilege 1544 WMIC.exe Token: SeTakeOwnershipPrivilege 1544 WMIC.exe Token: SeLoadDriverPrivilege 1544 WMIC.exe Token: SeSystemProfilePrivilege 1544 WMIC.exe Token: SeSystemtimePrivilege 1544 WMIC.exe Token: SeProfSingleProcessPrivilege 1544 WMIC.exe Token: SeIncBasePriorityPrivilege 1544 WMIC.exe Token: SeCreatePagefilePrivilege 1544 WMIC.exe Token: SeBackupPrivilege 1544 WMIC.exe Token: SeRestorePrivilege 1544 WMIC.exe Token: SeShutdownPrivilege 1544 WMIC.exe Token: SeDebugPrivilege 1544 WMIC.exe Token: SeSystemEnvironmentPrivilege 1544 WMIC.exe Token: SeRemoteShutdownPrivilege 1544 WMIC.exe Token: SeUndockPrivilege 1544 WMIC.exe Token: SeManageVolumePrivilege 1544 WMIC.exe Token: 33 1544 WMIC.exe Token: 34 1544 WMIC.exe Token: 35 1544 WMIC.exe Token: SeIncreaseQuotaPrivilege 1544 WMIC.exe Token: SeSecurityPrivilege 1544 WMIC.exe Token: SeTakeOwnershipPrivilege 1544 WMIC.exe Token: SeLoadDriverPrivilege 1544 WMIC.exe Token: SeSystemProfilePrivilege 1544 WMIC.exe Token: SeSystemtimePrivilege 1544 WMIC.exe Token: SeProfSingleProcessPrivilege 1544 WMIC.exe Token: SeIncBasePriorityPrivilege 1544 WMIC.exe Token: SeCreatePagefilePrivilege 1544 WMIC.exe Token: SeBackupPrivilege 1544 WMIC.exe Token: SeRestorePrivilege 1544 WMIC.exe Token: SeShutdownPrivilege 1544 WMIC.exe Token: SeDebugPrivilege 1544 WMIC.exe Token: SeSystemEnvironmentPrivilege 1544 WMIC.exe Token: SeRemoteShutdownPrivilege 1544 WMIC.exe Token: SeUndockPrivilege 1544 WMIC.exe Token: SeManageVolumePrivilege 1544 WMIC.exe Token: 33 1544 WMIC.exe Token: 34 1544 WMIC.exe Token: 35 1544 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1112 wrote to memory of 2044 1112 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe 28 PID 1112 wrote to memory of 2044 1112 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe 28 PID 1112 wrote to memory of 2044 1112 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe 28 PID 1112 wrote to memory of 2044 1112 78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe 28 PID 2044 wrote to memory of 1744 2044 cmd.exe 30 PID 2044 wrote to memory of 1744 2044 cmd.exe 30 PID 2044 wrote to memory of 1744 2044 cmd.exe 30 PID 2044 wrote to memory of 612 2044 cmd.exe 33 PID 2044 wrote to memory of 612 2044 cmd.exe 33 PID 2044 wrote to memory of 612 2044 cmd.exe 33 PID 2044 wrote to memory of 1544 2044 cmd.exe 37 PID 2044 wrote to memory of 1544 2044 cmd.exe 37 PID 2044 wrote to memory of 1544 2044 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe"C:\Users\Admin\AppData\Local\Temp\78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe"C:\Users\Admin\AppData\Local\Temp\78c11a0feca2fb59e2e8db85cf5052508347a66cb28ddaa5aac5ae4ba8b96ea7.exe" n11122⤵PID:1828
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1744
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:612
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1924
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1356
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:332