Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2022 11:50
Static task
static1
Behavioral task
behavioral1
Sample
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe
Resource
win10v2004-20220901-en
General
-
Target
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe
-
Size
208KB
-
MD5
12bc78e07cb69dd6ec32729240dbe537
-
SHA1
7b7d9b115ec10074f7166ec3379fead6e816da59
-
SHA256
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9
-
SHA512
c974592671b081d0af48c1aab9f9f02243773a081d9fadf70e3caa7454dca657b45bece27852397e74f601df1abdf5db496c821a5df624057355fd15c807e15a
-
SSDEEP
3072:GXbUMNAwQ2Jpo/AkQCUyevi8xRpz81NADJ2:ibUMKwQ2J4ReviSjeKN
Malware Config
Extracted
C:\Users\Admin\Desktop\decrypt_instructions.txt
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exedescription ioc process File renamed C:\Users\Admin\Pictures\RedoGet.png => C:\Users\Admin\Pictures\RedoGet.png.wizard 5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4644 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
WMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 1924 WMIC.exe Token: SeSecurityPrivilege 1924 WMIC.exe Token: SeTakeOwnershipPrivilege 1924 WMIC.exe Token: SeLoadDriverPrivilege 1924 WMIC.exe Token: SeSystemProfilePrivilege 1924 WMIC.exe Token: SeSystemtimePrivilege 1924 WMIC.exe Token: SeProfSingleProcessPrivilege 1924 WMIC.exe Token: SeIncBasePriorityPrivilege 1924 WMIC.exe Token: SeCreatePagefilePrivilege 1924 WMIC.exe Token: SeBackupPrivilege 1924 WMIC.exe Token: SeRestorePrivilege 1924 WMIC.exe Token: SeShutdownPrivilege 1924 WMIC.exe Token: SeDebugPrivilege 1924 WMIC.exe Token: SeSystemEnvironmentPrivilege 1924 WMIC.exe Token: SeRemoteShutdownPrivilege 1924 WMIC.exe Token: SeUndockPrivilege 1924 WMIC.exe Token: SeManageVolumePrivilege 1924 WMIC.exe Token: 33 1924 WMIC.exe Token: 34 1924 WMIC.exe Token: 35 1924 WMIC.exe Token: 36 1924 WMIC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.execmd.execmd.exedescription pid process target process PID 1312 wrote to memory of 212 1312 5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe cmd.exe PID 1312 wrote to memory of 212 1312 5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe cmd.exe PID 1312 wrote to memory of 2320 1312 5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe cmd.exe PID 1312 wrote to memory of 2320 1312 5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe cmd.exe PID 212 wrote to memory of 1924 212 cmd.exe WMIC.exe PID 212 wrote to memory of 1924 212 cmd.exe WMIC.exe PID 2320 wrote to memory of 4644 2320 cmd.exe vssadmin.exe PID 2320 wrote to memory of 4644 2320 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe"C:\Users\Admin\AppData\Local\Temp\5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\System32\Wbem\WMIC.exewmic.exe SHADOWCOPY /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All/ Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All/ Quiet3⤵
- Interacts with shadow copies
PID:4644
-
-