Analysis
-
max time kernel
127s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe
Resource
win10v2004-20220812-en
General
-
Target
HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe
-
Size
433KB
-
MD5
7273bcc0c3c3cc89a922c9eb2cc6797e
-
SHA1
6bf35f44a2267755c2646c89c836bd618c4e964c
-
SHA256
6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404
-
SHA512
c344cd1ee725f76f64888805e0310fddf39e9946884298d05aab6f4d8b43af44191ac3402a2c7758b2b0680e4fbcefc08dd7c155397d21f6b314363f018b2725
-
SSDEEP
12288:ZIEFNyLxXcP/bBwW4l4xSMz47ao0Hu4l:ZIEzZeWnxSE4Ooq
Malware Config
Extracted
C:\Users\Admin\Desktop\ReadMe.txt
venuslocker@torbox3uiot6wchz.onion
16jvWspVfvhjRgJhGCDETf29cjQAyNmx9G
https://hastebin.com/semoseguli.pl
https://hastebin.com/pifegafupi.scala
https://hastebin.com/uxuxoqikon.scala
https://hastebin.com/rocukapaga.scala
https://hastebin.com/igeyejigef.erl
https://perfectmoney.is
https://pmbitcoin.com/btc
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Adminbg.jpg" HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 3272 HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe Token: SeIncreaseQuotaPrivilege 1276 WMIC.exe Token: SeSecurityPrivilege 1276 WMIC.exe Token: SeTakeOwnershipPrivilege 1276 WMIC.exe Token: SeLoadDriverPrivilege 1276 WMIC.exe Token: SeSystemProfilePrivilege 1276 WMIC.exe Token: SeSystemtimePrivilege 1276 WMIC.exe Token: SeProfSingleProcessPrivilege 1276 WMIC.exe Token: SeIncBasePriorityPrivilege 1276 WMIC.exe Token: SeCreatePagefilePrivilege 1276 WMIC.exe Token: SeBackupPrivilege 1276 WMIC.exe Token: SeRestorePrivilege 1276 WMIC.exe Token: SeShutdownPrivilege 1276 WMIC.exe Token: SeDebugPrivilege 1276 WMIC.exe Token: SeSystemEnvironmentPrivilege 1276 WMIC.exe Token: SeRemoteShutdownPrivilege 1276 WMIC.exe Token: SeUndockPrivilege 1276 WMIC.exe Token: SeManageVolumePrivilege 1276 WMIC.exe Token: 33 1276 WMIC.exe Token: 34 1276 WMIC.exe Token: 35 1276 WMIC.exe Token: 36 1276 WMIC.exe Token: SeIncreaseQuotaPrivilege 1276 WMIC.exe Token: SeSecurityPrivilege 1276 WMIC.exe Token: SeTakeOwnershipPrivilege 1276 WMIC.exe Token: SeLoadDriverPrivilege 1276 WMIC.exe Token: SeSystemProfilePrivilege 1276 WMIC.exe Token: SeSystemtimePrivilege 1276 WMIC.exe Token: SeProfSingleProcessPrivilege 1276 WMIC.exe Token: SeIncBasePriorityPrivilege 1276 WMIC.exe Token: SeCreatePagefilePrivilege 1276 WMIC.exe Token: SeBackupPrivilege 1276 WMIC.exe Token: SeRestorePrivilege 1276 WMIC.exe Token: SeShutdownPrivilege 1276 WMIC.exe Token: SeDebugPrivilege 1276 WMIC.exe Token: SeSystemEnvironmentPrivilege 1276 WMIC.exe Token: SeRemoteShutdownPrivilege 1276 WMIC.exe Token: SeUndockPrivilege 1276 WMIC.exe Token: SeManageVolumePrivilege 1276 WMIC.exe Token: 33 1276 WMIC.exe Token: 34 1276 WMIC.exe Token: 35 1276 WMIC.exe Token: 36 1276 WMIC.exe Token: SeBackupPrivilege 5108 vssvc.exe Token: SeRestorePrivilege 5108 vssvc.exe Token: SeAuditPrivilege 5108 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.execmd.exedescription pid process target process PID 3272 wrote to memory of 3064 3272 HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe cmd.exe PID 3272 wrote to memory of 3064 3272 HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe cmd.exe PID 3064 wrote to memory of 1276 3064 cmd.exe WMIC.exe PID 3064 wrote to memory of 1276 3064 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Ransom.Win32.Generic-6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken