Analysis
-
max time kernel
206s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 21:58
Static task
static1
Behavioral task
behavioral1
Sample
6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe
Resource
win10v2004-20220812-en
General
-
Target
6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe
-
Size
743KB
-
MD5
69eb41d973e7c96fe47c381320dfd140
-
SHA1
e45c2f5e2f74c35beb1a019b708573155f5a17a1
-
SHA256
6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495
-
SHA512
5b4a8bf698640d7a25b9b6bdf1b9d73e9c99593c307c2f416b07bc1e9ea70091327cd6afcd5f5717a7f0160c1a46832d79ff4b1e4d1a45113f3f6d986fa88b52
-
SSDEEP
12288:zogZILd4+csZJQNtUbu+jlkB9XwN6qZvbU5+fXKQbX48KfVko93LYtZtq:zog84MJyUqXwjZvc+fa0Kfzos
Malware Config
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-grqyird.txt
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion/
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 3 IoCs
pid Process 1976 xlobkpb.exe 4716 xlobkpb.exe 3528 xlobkpb.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\LimitCheckpoint.CRW.grqyird svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\InstallEnter.RAW.grqyird svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 1976 xlobkpb.exe 1976 xlobkpb.exe 3528 xlobkpb.exe 3528 xlobkpb.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-grqyird.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4756 set thread context of 3628 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 81 PID 1976 set thread context of 4716 1976 xlobkpb.exe 86 PID 3528 set thread context of 1460 3528 xlobkpb.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
resource yara_rule behavioral2/files/0x0011000000022e2f-140.dat nsis_installer_1 behavioral2/files/0x0011000000022e2f-140.dat nsis_installer_2 behavioral2/files/0x0011000000022e2f-141.dat nsis_installer_1 behavioral2/files/0x0011000000022e2f-141.dat nsis_installer_2 behavioral2/files/0x0011000000022e2f-147.dat nsis_installer_1 behavioral2/files/0x0011000000022e2f-147.dat nsis_installer_2 behavioral2/files/0x0011000000022e2f-159.dat nsis_installer_1 behavioral2/files/0x0011000000022e2f-159.dat nsis_installer_2 -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000}\MaxCapacity = "15140" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00320066006200340063006300640063002d0030003000300030002d0030003000300030002d0030003000300030002d006400300031003200300030003000300030003000300030007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000}\NukeOnDelete = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3628 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 3628 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 4716 xlobkpb.exe 4716 xlobkpb.exe 4716 xlobkpb.exe 4716 xlobkpb.exe 4716 xlobkpb.exe 4716 xlobkpb.exe 4716 xlobkpb.exe 4716 xlobkpb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4716 xlobkpb.exe Token: SeDebugPrivilege 4716 xlobkpb.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4756 wrote to memory of 3628 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 81 PID 4756 wrote to memory of 3628 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 81 PID 4756 wrote to memory of 3628 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 81 PID 4756 wrote to memory of 3628 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 81 PID 4756 wrote to memory of 3628 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 81 PID 4756 wrote to memory of 3628 4756 6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe 81 PID 1976 wrote to memory of 4716 1976 xlobkpb.exe 86 PID 1976 wrote to memory of 4716 1976 xlobkpb.exe 86 PID 1976 wrote to memory of 4716 1976 xlobkpb.exe 86 PID 1976 wrote to memory of 4716 1976 xlobkpb.exe 86 PID 1976 wrote to memory of 4716 1976 xlobkpb.exe 86 PID 1976 wrote to memory of 4716 1976 xlobkpb.exe 86 PID 4716 wrote to memory of 772 4716 xlobkpb.exe 71 PID 4716 wrote to memory of 2484 4716 xlobkpb.exe 26 PID 4716 wrote to memory of 3528 4716 xlobkpb.exe 90 PID 4716 wrote to memory of 3528 4716 xlobkpb.exe 90 PID 4716 wrote to memory of 3528 4716 xlobkpb.exe 90 PID 772 wrote to memory of 3464 772 svchost.exe 91 PID 772 wrote to memory of 3464 772 svchost.exe 91 PID 3528 wrote to memory of 1460 3528 xlobkpb.exe 92 PID 3528 wrote to memory of 1460 3528 xlobkpb.exe 92 PID 3528 wrote to memory of 1460 3528 xlobkpb.exe 92 PID 3528 wrote to memory of 1460 3528 xlobkpb.exe 92 PID 3528 wrote to memory of 1460 3528 xlobkpb.exe 92 PID 3528 wrote to memory of 1460 3528 xlobkpb.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe"C:\Users\Admin\AppData\Local\Temp\6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe"C:\Users\Admin\AppData\Local\Temp\6ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeC:\Users\Admin\AppData\Local\Temp\xlobkpb.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe" -u3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"4⤵PID:1460
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD5a0644de2c1dd7fdf54725956e5258d6d
SHA1d2795c1aaeff9437002c4bcc877ff3e73d7cdc14
SHA256f45efafddc4e9024d9dad16badc0cd7ae486291fb6ab91e08a4be361c46102e5
SHA512e913239ea350e281dec98cc326188c0521e92e8c849a7b3e7dbfa7f0c6f7bc2a33b6ad1c4af1ab67ca70dc1384f2688eb20165e8589b2926edb5ca21a185a3dd
-
Filesize
654B
MD5a0644de2c1dd7fdf54725956e5258d6d
SHA1d2795c1aaeff9437002c4bcc877ff3e73d7cdc14
SHA256f45efafddc4e9024d9dad16badc0cd7ae486291fb6ab91e08a4be361c46102e5
SHA512e913239ea350e281dec98cc326188c0521e92e8c849a7b3e7dbfa7f0c6f7bc2a33b6ad1c4af1ab67ca70dc1384f2688eb20165e8589b2926edb5ca21a185a3dd
-
Filesize
654B
MD55ec5ddf805ee7e2fe54e40bc02727d04
SHA1dc97139cbcf130cd334dfb3a2bdd3c8647dc14e2
SHA256b32177c389054eb2211eda88e1e16ebcc2698f0e8bded5d8936e07e8c1b4203b
SHA512b01ebeaaf57522a6bd665219ae9652fc2f5337a7a6ffad3f7a8117983909e518a43c6e95e15833838cae7d681a10333aaf1188f528dab98d5253effad7988ff3
-
Filesize
654B
MD57e60a015aba8517263735c3912b45815
SHA1a626c1f29a2a477e9617244cdc0d9d35a6a54bba
SHA25636a4a32b34334f6a55a0b29ed7b82dff68971051a8ebf319e0a96073b2cf490d
SHA51264789e149596081a99acd6c99172a5b9861f71327415c37e95fc471d81a1ce1d02bfcfdaefa8034550ae9366adb69be9623d778b75f2a63639545129ff7c4886
-
Filesize
654B
MD552f40c883db750d1cec8f2db59449eb4
SHA1325d78f40855620f159c9dcee1189397a2fae9c9
SHA25601316be29010febd024b393b6a7d99dfed6d4c204baad54d44a9fb85905c84e4
SHA512d07fb69ace4f2b40419c309fb5fee59ef0e101f74717b75c09f870b29ba19f4922f725a02581e546409b948698cc806c9f8d57bc29ef0a97a854c3d27ffbcbfc
-
Filesize
54KB
MD5010db3b152d0ea1e58030cf24faa970a
SHA17846ef6f5bc59165a8422d5ebb6bd2c687a039ee
SHA256dbd14b1045af098de2d861f487d534604afc06fcfbeed6c35ecef06b7ea2be0a
SHA5126473234297caf5bd01a6e89e267631a10277042ab7808db414cf034b962501d85218cb07189f62bc33a2485d91b5649743ae4434af02c2d382e39defb6340270
-
Filesize
54KB
MD5010db3b152d0ea1e58030cf24faa970a
SHA17846ef6f5bc59165a8422d5ebb6bd2c687a039ee
SHA256dbd14b1045af098de2d861f487d534604afc06fcfbeed6c35ecef06b7ea2be0a
SHA5126473234297caf5bd01a6e89e267631a10277042ab7808db414cf034b962501d85218cb07189f62bc33a2485d91b5649743ae4434af02c2d382e39defb6340270
-
Filesize
54KB
MD5010db3b152d0ea1e58030cf24faa970a
SHA17846ef6f5bc59165a8422d5ebb6bd2c687a039ee
SHA256dbd14b1045af098de2d861f487d534604afc06fcfbeed6c35ecef06b7ea2be0a
SHA5126473234297caf5bd01a6e89e267631a10277042ab7808db414cf034b962501d85218cb07189f62bc33a2485d91b5649743ae4434af02c2d382e39defb6340270
-
Filesize
54KB
MD5010db3b152d0ea1e58030cf24faa970a
SHA17846ef6f5bc59165a8422d5ebb6bd2c687a039ee
SHA256dbd14b1045af098de2d861f487d534604afc06fcfbeed6c35ecef06b7ea2be0a
SHA5126473234297caf5bd01a6e89e267631a10277042ab7808db414cf034b962501d85218cb07189f62bc33a2485d91b5649743ae4434af02c2d382e39defb6340270
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
743KB
MD569eb41d973e7c96fe47c381320dfd140
SHA1e45c2f5e2f74c35beb1a019b708573155f5a17a1
SHA2566ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495
SHA5125b4a8bf698640d7a25b9b6bdf1b9d73e9c99593c307c2f416b07bc1e9ea70091327cd6afcd5f5717a7f0160c1a46832d79ff4b1e4d1a45113f3f6d986fa88b52
-
Filesize
743KB
MD569eb41d973e7c96fe47c381320dfd140
SHA1e45c2f5e2f74c35beb1a019b708573155f5a17a1
SHA2566ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495
SHA5125b4a8bf698640d7a25b9b6bdf1b9d73e9c99593c307c2f416b07bc1e9ea70091327cd6afcd5f5717a7f0160c1a46832d79ff4b1e4d1a45113f3f6d986fa88b52
-
Filesize
743KB
MD569eb41d973e7c96fe47c381320dfd140
SHA1e45c2f5e2f74c35beb1a019b708573155f5a17a1
SHA2566ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495
SHA5125b4a8bf698640d7a25b9b6bdf1b9d73e9c99593c307c2f416b07bc1e9ea70091327cd6afcd5f5717a7f0160c1a46832d79ff4b1e4d1a45113f3f6d986fa88b52
-
Filesize
743KB
MD569eb41d973e7c96fe47c381320dfd140
SHA1e45c2f5e2f74c35beb1a019b708573155f5a17a1
SHA2566ce78b597a3e693e58b3fee9ee9b549991d071d6e7928f817d69e299048d9495
SHA5125b4a8bf698640d7a25b9b6bdf1b9d73e9c99593c307c2f416b07bc1e9ea70091327cd6afcd5f5717a7f0160c1a46832d79ff4b1e4d1a45113f3f6d986fa88b52
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.JPG.grqyird
Filesize36KB
MD53ad8f429c541e4f888d259189bebf3f1
SHA1d5c70cb16920b112ff7e54db6dd7226765304f3e
SHA2560469023fca7bcfe135cbdbda45df622ea0f54e1f4d51a5d134e0bf7ddc7d1b16
SHA51293fe7f2d73e961d2f4e8da08bb92d937605e4ce96724c3c07d21d9b9eb1831073f3a353aa91ee6fc87a2c4a7a05cb7487c17cd0ccb22af3a9986b571e14e520d
-
Filesize
128KB
MD5cb80ba5eac84495ef58cb8a50a4c4b20
SHA1d6cf06bfa172e015fef035e43d7e96569585db27
SHA2561a3e9bc19267e7e479dfb171ec78ebd50da057e9a5204971f277a96ddffdd39d
SHA51259e86d12029ec0ea59051ed849288fb4e10638f40fe7cb688491ebd1f12c6f5165cdd409e95cf1ff3cdcc6c09eb93e637940c9974b43d224e53b2c89983b2581
-
Filesize
408B
MD537c50ee26a96fcf90f0bc664f021b180
SHA1ef894e77e6aa816a1f7907d5e6f6790f3c8a343e
SHA25668c4e5c9db929ebc9513b07487a28f1029129ccbb79a1f84868133f3bfaa8ac8
SHA512a40a040f8e8c7265873906e338840f2f106c9d0575ed07c41aee0f160bc394a47465588b7719621f9d680ee91109cf76094eebc36b5d00eb15c2c7fc30f724b6
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390