Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 15:41
Static task
static1
Behavioral task
behavioral1
Sample
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe
Resource
win10v2004-20220812-en
General
-
Target
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe
-
Size
1019KB
-
MD5
1ea130f39d90ae08b289a13406410ec3
-
SHA1
f87fcf3b7becd3ada883a42f79e05943abb21c09
-
SHA256
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd
-
SHA512
3acadb8b2f9062f4c77c6056995f587b6828305ea9583917bd93105fa4233157fc9049271520ade6b69f93707d4bddc1c0aabfd8b15f04dd90a95c266074d017
-
SSDEEP
24576:fslszepLtFECEBMM4Zf40Pzm+XRtdaBVQIOaZf8P2r:fFepRFEXu4Gyc+J8P2r
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-vmuizxi.txt
http://uwm2wosrob3gplxy.onion.cab
http://uwm2wosrob3gplxy.tor2web.org
http://uwm2wosrob3gplxy.onion/
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-vmuizxi.txt
http://uwm2wosrob3gplxy.onion.cab
http://uwm2wosrob3gplxy.tor2web.org
http://uwm2wosrob3gplxy.onion/
Extracted
C:\ProgramData\zlwdkgg.html
http://uwm2wosrob3gplxy.onion.cab
http://uwm2wosrob3gplxy.tor2web.org
http://uwm2wosrob3gplxy.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1248 pdfisga.exe 2024 pdfisga.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\PushUnregister.RAW.vmuizxi svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\MountGrant.RAW.vmuizxi svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation pdfisga.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat pdfisga.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-vmuizxi.bmp" Explorer.EXE -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-vmuizxi.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-vmuizxi.bmp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1900 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch pdfisga.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" pdfisga.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main pdfisga.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{dae07ae4-2a34-11ed-86c6-806e6f6e6963} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{dae07ae4-2a34-11ed-86c6-806e6f6e6963}\MaxCapacity = "15140" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{dae07ae4-2a34-11ed-86c6-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00640061006500300037006100650034002d0032006100330034002d0031003100650064002d0038003600630036002d003800300036006500360066003600650036003900360033007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1376 21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe 1248 pdfisga.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1248 pdfisga.exe Token: SeDebugPrivilege 1248 pdfisga.exe Token: SeShutdownPrivilege 1240 Explorer.EXE Token: SeShutdownPrivilege 1240 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 pdfisga.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2024 pdfisga.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 pdfisga.exe 2024 pdfisga.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1240 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1248 1168 taskeng.exe 27 PID 1168 wrote to memory of 1248 1168 taskeng.exe 27 PID 1168 wrote to memory of 1248 1168 taskeng.exe 27 PID 1168 wrote to memory of 1248 1168 taskeng.exe 27 PID 1248 wrote to memory of 588 1248 pdfisga.exe 20 PID 588 wrote to memory of 832 588 svchost.exe 28 PID 588 wrote to memory of 832 588 svchost.exe 28 PID 588 wrote to memory of 832 588 svchost.exe 28 PID 1248 wrote to memory of 1240 1248 pdfisga.exe 6 PID 1248 wrote to memory of 1900 1248 pdfisga.exe 29 PID 1248 wrote to memory of 1900 1248 pdfisga.exe 29 PID 1248 wrote to memory of 1900 1248 pdfisga.exe 29 PID 1248 wrote to memory of 1900 1248 pdfisga.exe 29 PID 1248 wrote to memory of 2024 1248 pdfisga.exe 31 PID 1248 wrote to memory of 2024 1248 pdfisga.exe 31 PID 1248 wrote to memory of 2024 1248 pdfisga.exe 31 PID 1248 wrote to memory of 2024 1248 pdfisga.exe 31 PID 588 wrote to memory of 396 588 svchost.exe 32 PID 588 wrote to memory of 396 588 svchost.exe 32 PID 588 wrote to memory of 396 588 svchost.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe"C:\Users\Admin\AppData\Local\Temp\21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:832
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:396
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D10B0B53-EB33-4DC7-96D0-F8D7E4BA9C21} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\pdfisga.exeC:\Users\Admin\AppData\Local\Temp\pdfisga.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all3⤵
- Interacts with shadow copies
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\pdfisga.exe"C:\Users\Admin\AppData\Local\Temp\pdfisga.exe" -u3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD55b81d8391c76dcb0039318a1d6962589
SHA145fdc8b4ce3f1f6fe5a81a3edd90eea901837af5
SHA2568778f68d5e684bf81772952ddb8be1af3b4439524deecfd29a3b2b7f326f972a
SHA5122c82559615bdc92e7de8485fedd4892f97aed49939f689839e6be77a87d7b346a8f0eb71e9f7aa7e5b629b6efd7822b17d87aea73065b4b8b5500758f75b96a3
-
Filesize
654B
MD55b81d8391c76dcb0039318a1d6962589
SHA145fdc8b4ce3f1f6fe5a81a3edd90eea901837af5
SHA2568778f68d5e684bf81772952ddb8be1af3b4439524deecfd29a3b2b7f326f972a
SHA5122c82559615bdc92e7de8485fedd4892f97aed49939f689839e6be77a87d7b346a8f0eb71e9f7aa7e5b629b6efd7822b17d87aea73065b4b8b5500758f75b96a3
-
Filesize
654B
MD5add42dde22cf24594624dfd4cf099469
SHA1028c77d83224735dd5e431f303ac7a422bc943bf
SHA256e230c0d69753cfa4bc3bc8b4f9b65f21a43076898c9fc951a6ccd8a03465b252
SHA512029c9c35aaf16e97116fe32ff663b79a91122ebf03bc3e66ef21bdd097cb7744f5645d46f887cbbce4c663dd6bff83a2a19a428a89d173f68641d046497311f7
-
Filesize
654B
MD5add42dde22cf24594624dfd4cf099469
SHA1028c77d83224735dd5e431f303ac7a422bc943bf
SHA256e230c0d69753cfa4bc3bc8b4f9b65f21a43076898c9fc951a6ccd8a03465b252
SHA512029c9c35aaf16e97116fe32ff663b79a91122ebf03bc3e66ef21bdd097cb7744f5645d46f887cbbce4c663dd6bff83a2a19a428a89d173f68641d046497311f7
-
Filesize
64KB
MD5bc9561f255b0b9d6d5310c0b5ed11d56
SHA1738a13448eaa70d9630a443fd0aa4b5037010c10
SHA256dcdb47426cdda560672929b1723544b1a80ac8055cd4283651b01f74732f6b7b
SHA51272315ab9eabb8fa15795def4fd82e60acff49c400fc60c02568a000d43dfc2275caa3bb08895b440eeb468ffecdaadc063acd92fc511e160e5b32c364647822b
-
Filesize
1019KB
MD51ea130f39d90ae08b289a13406410ec3
SHA1f87fcf3b7becd3ada883a42f79e05943abb21c09
SHA25621a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd
SHA5123acadb8b2f9062f4c77c6056995f587b6828305ea9583917bd93105fa4233157fc9049271520ade6b69f93707d4bddc1c0aabfd8b15f04dd90a95c266074d017
-
Filesize
1019KB
MD51ea130f39d90ae08b289a13406410ec3
SHA1f87fcf3b7becd3ada883a42f79e05943abb21c09
SHA25621a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd
SHA5123acadb8b2f9062f4c77c6056995f587b6828305ea9583917bd93105fa4233157fc9049271520ade6b69f93707d4bddc1c0aabfd8b15f04dd90a95c266074d017
-
Filesize
1019KB
MD51ea130f39d90ae08b289a13406410ec3
SHA1f87fcf3b7becd3ada883a42f79e05943abb21c09
SHA25621a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd
SHA5123acadb8b2f9062f4c77c6056995f587b6828305ea9583917bd93105fa4233157fc9049271520ade6b69f93707d4bddc1c0aabfd8b15f04dd90a95c266074d017