Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-10-2022 17:36
Static task
static1
Behavioral task
behavioral1
Sample
Company Schedules New - Image Slideshow.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Company Schedules New - Image Slideshow.exe
Resource
win10v2004-20220901-en
General
-
Target
Company Schedules New - Image Slideshow.exe
-
Size
208KB
-
MD5
12bc78e07cb69dd6ec32729240dbe537
-
SHA1
7b7d9b115ec10074f7166ec3379fead6e816da59
-
SHA256
5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9
-
SHA512
c974592671b081d0af48c1aab9f9f02243773a081d9fadf70e3caa7454dca657b45bece27852397e74f601df1abdf5db496c821a5df624057355fd15c807e15a
-
SSDEEP
3072:GXbUMNAwQ2Jpo/AkQCUyevi8xRpz81NADJ2:ibUMKwQ2J4ReviSjeKN
Malware Config
Extracted
C:\Users\Admin\Desktop\decrypt_instructions.txt
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RemoveReceive.png => C:\Users\Admin\Pictures\RemoveReceive.png.wizard Company Schedules New - Image Slideshow.exe File renamed C:\Users\Admin\Pictures\SkipOpen.png => C:\Users\Admin\Pictures\SkipOpen.png.wizard Company Schedules New - Image Slideshow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1224 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2040 WMIC.exe Token: SeSecurityPrivilege 2040 WMIC.exe Token: SeTakeOwnershipPrivilege 2040 WMIC.exe Token: SeLoadDriverPrivilege 2040 WMIC.exe Token: SeSystemProfilePrivilege 2040 WMIC.exe Token: SeSystemtimePrivilege 2040 WMIC.exe Token: SeProfSingleProcessPrivilege 2040 WMIC.exe Token: SeIncBasePriorityPrivilege 2040 WMIC.exe Token: SeCreatePagefilePrivilege 2040 WMIC.exe Token: SeBackupPrivilege 2040 WMIC.exe Token: SeRestorePrivilege 2040 WMIC.exe Token: SeShutdownPrivilege 2040 WMIC.exe Token: SeDebugPrivilege 2040 WMIC.exe Token: SeSystemEnvironmentPrivilege 2040 WMIC.exe Token: SeRemoteShutdownPrivilege 2040 WMIC.exe Token: SeUndockPrivilege 2040 WMIC.exe Token: SeManageVolumePrivilege 2040 WMIC.exe Token: 33 2040 WMIC.exe Token: 34 2040 WMIC.exe Token: 35 2040 WMIC.exe Token: 33 1744 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1744 AUDIODG.EXE Token: 33 1744 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1744 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 948 wrote to memory of 1732 948 Company Schedules New - Image Slideshow.exe 28 PID 948 wrote to memory of 1732 948 Company Schedules New - Image Slideshow.exe 28 PID 948 wrote to memory of 1732 948 Company Schedules New - Image Slideshow.exe 28 PID 948 wrote to memory of 972 948 Company Schedules New - Image Slideshow.exe 29 PID 948 wrote to memory of 972 948 Company Schedules New - Image Slideshow.exe 29 PID 948 wrote to memory of 972 948 Company Schedules New - Image Slideshow.exe 29 PID 1732 wrote to memory of 2040 1732 cmd.exe 32 PID 1732 wrote to memory of 2040 1732 cmd.exe 32 PID 1732 wrote to memory of 2040 1732 cmd.exe 32 PID 972 wrote to memory of 1224 972 cmd.exe 33 PID 972 wrote to memory of 1224 972 cmd.exe 33 PID 972 wrote to memory of 1224 972 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Company Schedules New - Image Slideshow.exe"C:\Users\Admin\AppData\Local\Temp\Company Schedules New - Image Slideshow.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\System32\Wbem\WMIC.exewmic.exe SHADOWCOPY /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All/ Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All/ Quiet3⤵
- Interacts with shadow copies
PID:1224
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1560
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744