Analysis
-
max time kernel
164s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 09:54
Behavioral task
behavioral1
Sample
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe
Resource
win10v2004-20220812-en
General
-
Target
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe
-
Size
211KB
-
MD5
511e849a593b7787b1387b56f12d8c05
-
SHA1
6c830eed04570ba8f8873cba3f61ca568f7b9535
-
SHA256
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e
-
SHA512
3d803144229fd7e63e971d0bd617fb96eaf2a1e802ad36dc2eac3fe809b351f68d07f4b81ebd24b9367e72b9d5e91a655a07acfd430ee631e226def7ff987fe6
-
SSDEEP
6144:Bia1gMHOPDWIhID8X/4DQFu/U3buRKlemZ9DnGAetTsB+Q+:BIMH06cID84DQFu/U3buRKlemZ9DnGAI
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Detects Zeppelin payload 5 IoCs
Processes:
resource yara_rule behavioral1/files/0x00150000000054ab-55.dat family_zeppelin behavioral1/files/0x00150000000054ab-56.dat family_zeppelin behavioral1/files/0x00150000000054ab-58.dat family_zeppelin behavioral1/files/0x00150000000054ab-62.dat family_zeppelin behavioral1/files/0x00150000000054ab-64.dat family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Executes dropped EXE 2 IoCs
Processes:
TrustedInstaller.exeTrustedInstaller.exepid Process 632 TrustedInstaller.exe 1720 TrustedInstaller.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid Process 952 notepad.exe -
Loads dropped DLL 2 IoCs
Processes:
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exepid Process 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\TrustedInstaller.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\TrustedInstaller.exe\" -start" 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
TrustedInstaller.exedescription ioc Process File opened (read-only) \??\T: TrustedInstaller.exe File opened (read-only) \??\L: TrustedInstaller.exe File opened (read-only) \??\B: TrustedInstaller.exe File opened (read-only) \??\E: TrustedInstaller.exe File opened (read-only) \??\Y: TrustedInstaller.exe File opened (read-only) \??\S: TrustedInstaller.exe File opened (read-only) \??\P: TrustedInstaller.exe File opened (read-only) \??\K: TrustedInstaller.exe File opened (read-only) \??\H: TrustedInstaller.exe File opened (read-only) \??\J: TrustedInstaller.exe File opened (read-only) \??\F: TrustedInstaller.exe File opened (read-only) \??\A: TrustedInstaller.exe File opened (read-only) \??\W: TrustedInstaller.exe File opened (read-only) \??\V: TrustedInstaller.exe File opened (read-only) \??\U: TrustedInstaller.exe File opened (read-only) \??\O: TrustedInstaller.exe File opened (read-only) \??\N: TrustedInstaller.exe File opened (read-only) \??\I: TrustedInstaller.exe File opened (read-only) \??\G: TrustedInstaller.exe File opened (read-only) \??\Z: TrustedInstaller.exe File opened (read-only) \??\X: TrustedInstaller.exe File opened (read-only) \??\R: TrustedInstaller.exe File opened (read-only) \??\Q: TrustedInstaller.exe File opened (read-only) \??\M: TrustedInstaller.exe -
Drops file in Program Files directory 64 IoCs
Processes:
TrustedInstaller.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.commands.nl_ja_4.4.0.v20140623020002.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_zh_4.4.0.v20140623020002.jar.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nome.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tarawa.F98-443-138 TrustedInstaller.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\ECLIPSE_.SF TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunmscapi.jar.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Blanc-Sablon.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Menominee TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\epl-v10.html TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.configuration_5.5.0.165303.jar TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-highlight.png TrustedInstaller.exe File created C:\Program Files\Java\jdk1.7.0_80\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\net.properties.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guayaquil.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Vostok.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Sakhalin.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_ButtonGraphic.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\jaccess.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.http.jetty_3.0.200.v20131021-1843.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Cairo.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\San_Juan TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Almaty TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.xml.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Creston.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Whitehorse.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\config.ini.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director_2.3.100.v20140224-1921.jar TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Regina.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Santo_Domingo TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Cordoba.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\San_Juan.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\artifacts.xml TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guyana.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_SelectionSubpicture.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaBrightDemiBold.ttf TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ust-Nera TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_zh_4.4.0.v20140623020002.jar.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.html.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Caracas TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Irkutsk TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\es-ES\WMM2CLIP.dll.mui TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Mendoza.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.properties.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.ja_5.5.0.165303.jar.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.F98-443-138 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_ButtonGraphic.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbytools.jar TrustedInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exedescription pid Process Token: SeDebugPrivilege 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe Token: SeDebugPrivilege 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exeTrustedInstaller.exedescription pid Process procid_target PID 880 wrote to memory of 632 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 28 PID 880 wrote to memory of 632 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 28 PID 880 wrote to memory of 632 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 28 PID 880 wrote to memory of 632 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 28 PID 880 wrote to memory of 952 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 29 PID 880 wrote to memory of 952 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 29 PID 880 wrote to memory of 952 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 29 PID 880 wrote to memory of 952 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 29 PID 880 wrote to memory of 952 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 29 PID 880 wrote to memory of 952 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 29 PID 880 wrote to memory of 952 880 7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe 29 PID 632 wrote to memory of 1720 632 TrustedInstaller.exe 30 PID 632 wrote to memory of 1720 632 TrustedInstaller.exe 30 PID 632 wrote to memory of 1720 632 TrustedInstaller.exe 30 PID 632 wrote to memory of 1720 632 TrustedInstaller.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe"C:\Users\Admin\AppData\Local\Temp\7757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1720
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Deletes itself
PID:952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5511e849a593b7787b1387b56f12d8c05
SHA16c830eed04570ba8f8873cba3f61ca568f7b9535
SHA2567757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e
SHA5123d803144229fd7e63e971d0bd617fb96eaf2a1e802ad36dc2eac3fe809b351f68d07f4b81ebd24b9367e72b9d5e91a655a07acfd430ee631e226def7ff987fe6
-
Filesize
211KB
MD5511e849a593b7787b1387b56f12d8c05
SHA16c830eed04570ba8f8873cba3f61ca568f7b9535
SHA2567757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e
SHA5123d803144229fd7e63e971d0bd617fb96eaf2a1e802ad36dc2eac3fe809b351f68d07f4b81ebd24b9367e72b9d5e91a655a07acfd430ee631e226def7ff987fe6
-
Filesize
211KB
MD5511e849a593b7787b1387b56f12d8c05
SHA16c830eed04570ba8f8873cba3f61ca568f7b9535
SHA2567757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e
SHA5123d803144229fd7e63e971d0bd617fb96eaf2a1e802ad36dc2eac3fe809b351f68d07f4b81ebd24b9367e72b9d5e91a655a07acfd430ee631e226def7ff987fe6
-
Filesize
211KB
MD5511e849a593b7787b1387b56f12d8c05
SHA16c830eed04570ba8f8873cba3f61ca568f7b9535
SHA2567757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e
SHA5123d803144229fd7e63e971d0bd617fb96eaf2a1e802ad36dc2eac3fe809b351f68d07f4b81ebd24b9367e72b9d5e91a655a07acfd430ee631e226def7ff987fe6
-
Filesize
211KB
MD5511e849a593b7787b1387b56f12d8c05
SHA16c830eed04570ba8f8873cba3f61ca568f7b9535
SHA2567757c11c449860e2dd54ae97e05835fb39f89a9c93f32dfc23b258ad49c3622e
SHA5123d803144229fd7e63e971d0bd617fb96eaf2a1e802ad36dc2eac3fe809b351f68d07f4b81ebd24b9367e72b9d5e91a655a07acfd430ee631e226def7ff987fe6