Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 15:41
Static task
static1
Behavioral task
behavioral1
Sample
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe
Resource
win10v2004-20220812-en
General
-
Target
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe
-
Size
1019KB
-
MD5
1ea130f39d90ae08b289a13406410ec3
-
SHA1
f87fcf3b7becd3ada883a42f79e05943abb21c09
-
SHA256
21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd
-
SHA512
3acadb8b2f9062f4c77c6056995f587b6828305ea9583917bd93105fa4233157fc9049271520ade6b69f93707d4bddc1c0aabfd8b15f04dd90a95c266074d017
-
SSDEEP
24576:fslszepLtFECEBMM4Zf40Pzm+XRtdaBVQIOaZf8P2r:fFepRFEXu4Gyc+J8P2r
Malware Config
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-kbzujrd.txt
http://uwm2wosrob3gplxy.onion.cab
http://uwm2wosrob3gplxy.tor2web.org
http://uwm2wosrob3gplxy.onion/
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 1 IoCs
pid Process 4924 xlobkpb.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\BlockSend.RAW.kbzujrd svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\InstallConvert.CRW.kbzujrd svchost.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-kbzujrd.bmp" Explorer.EXE -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000}\MaxCapacity = "15140" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00320066006200340063006300640063002d0030003000300030002d0030003000300030002d0030003000300030002d006400300031003200300030003000300030003000300030007d0000000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1208 21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe 1208 21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe 4924 xlobkpb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4924 xlobkpb.exe Token: SeDebugPrivilege 4924 xlobkpb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4924 wrote to memory of 764 4924 xlobkpb.exe 3 PID 764 wrote to memory of 1780 764 svchost.exe 84 PID 764 wrote to memory of 1780 764 svchost.exe 84 PID 764 wrote to memory of 2612 764 svchost.exe 85 PID 764 wrote to memory of 2612 764 svchost.exe 85 PID 764 wrote to memory of 3804 764 svchost.exe 91 PID 764 wrote to memory of 3804 764 svchost.exe 91 PID 4924 wrote to memory of 2492 4924 xlobkpb.exe 17
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:1780
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:2612
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:3804
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe"C:\Users\Admin\AppData\Local\Temp\21a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeC:\Users\Admin\AppData\Local\Temp\xlobkpb.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD5452ba1166cdeae640f4537839ec0a860
SHA17e5da960e6fd45359b4adbf8476237924fdf9041
SHA256ea83c76bd2a9c4f8d2a0c2df9a6ef07482bd681881fa7548f4e2cdb733ba991f
SHA51206af8261436bcf5a7fcd9b5a16a84bb883e9673f8934f954f0ae2e3450f9a9b071d5c2ea3d6edd88423d8deb448fc0a3e02e22c60960ad3fbad68609fafcfe23
-
Filesize
654B
MD5452ba1166cdeae640f4537839ec0a860
SHA17e5da960e6fd45359b4adbf8476237924fdf9041
SHA256ea83c76bd2a9c4f8d2a0c2df9a6ef07482bd681881fa7548f4e2cdb733ba991f
SHA51206af8261436bcf5a7fcd9b5a16a84bb883e9673f8934f954f0ae2e3450f9a9b071d5c2ea3d6edd88423d8deb448fc0a3e02e22c60960ad3fbad68609fafcfe23
-
Filesize
654B
MD5cac6e39a40e803d7ef31b05aeb9076c0
SHA120d705d553ca887e9b03e0c047dbb087bd000430
SHA256b2ca453fbd01e4f5d66347a38dfee0316a92b3006f79aaae9bc4f0de534a7b6c
SHA512eceacb5412645250e9172e3003db4acd3764c6200034554e0b538c08c6a205db48a228b05223e6d7f520c108f2aa707407f7eaaa8beb81dc4960057eedc9f5bd
-
Filesize
654B
MD55e47edd5494f0bd7870a37a1f75478b7
SHA103dfe25a2a76be71e5cb020838fc8b7dfc647ff6
SHA25635d67f4d5a68a3305e0ad626144ddaeef1fccce9776c128d0f413b7ff639e481
SHA5127bd6abe762a54dfbadc4be10d3d406d9f8b3d064953f0b26c29d5ce159f76ee5354c73e9453efa34d0ccc30cf0e8bcf505e5baf996e9921e7a87c5ef9a6bd285
-
Filesize
654B
MD527d97519757ac144eb9e08a4601fa3bf
SHA174cdb867078cbf0d659ea80efcf8f99ad8ad8ff8
SHA2563eaec7abfe27565f2977569ae29f02218ff03e0ef340b484eac8b73e9d1e2ed3
SHA51264d3b11d6d67d06ff0207e7f1efa2044f60ccaca38d4418476fe00bb3322fed10b8702204f1c1788e62e3ba3583a02b6ff8b7b65d197785c6697ef479067da82
-
Filesize
1019KB
MD51ea130f39d90ae08b289a13406410ec3
SHA1f87fcf3b7becd3ada883a42f79e05943abb21c09
SHA25621a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd
SHA5123acadb8b2f9062f4c77c6056995f587b6828305ea9583917bd93105fa4233157fc9049271520ade6b69f93707d4bddc1c0aabfd8b15f04dd90a95c266074d017
-
Filesize
1019KB
MD51ea130f39d90ae08b289a13406410ec3
SHA1f87fcf3b7becd3ada883a42f79e05943abb21c09
SHA25621a1575646d545219ba6813d316cdf388f05c2d45d0b0011a5bfb77b1e2ca2cd
SHA5123acadb8b2f9062f4c77c6056995f587b6828305ea9583917bd93105fa4233157fc9049271520ade6b69f93707d4bddc1c0aabfd8b15f04dd90a95c266074d017
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.JPG.kbzujrd
Filesize36KB
MD52b47b2f14bc9095b987c1688935b0203
SHA11a560e08565edcf9bd7f15c28342b80ee06ffd5d
SHA256e7b36107824f47b3b10c913836b717e2924509e5a9df3ddb7cbafa6d25356cf3
SHA512aa4534a30bcb2141d82609700b58b5bd7900ac1245eb8af25f582ab3e9fb5684f8def4537cf89582cae5f0ce615a8c13817e0a3434c5cd9c1a572e6a8a37d86b