Analysis
-
max time kernel
151s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 18:04
Behavioral task
behavioral1
Sample
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe
Resource
win10v2004-20220901-en
General
-
Target
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe
-
Size
42KB
-
MD5
65b228bf3272e41025480c9780f7cdd3
-
SHA1
e29ba9d7767fbdf686e231701b6b3a329f1a0484
-
SHA256
73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
-
SHA512
e0e0ef81048f4053942c69c9a8192b644962bdd092498f027598377249f283925f3fb60987feafbf46ae4cced229d34fa0152c7b2cbde1dff4fe3beece744d54
-
SSDEEP
768:xO1oR/hjVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDsFGtnhidVY4ss2+X4:x55S1FKnDtkuImiwiDY4sXd
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\+README-WARNING+.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 2020 wbadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\an.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mip.exe.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tabskb.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\AssertUnregister.ex_ 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IpsMigrationPlugin.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\rtscom.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkObj.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipBand.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipBand.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\rtscom.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkObj.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\TipTsf.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwruksh.dat 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File created C:\Program Files\7-Zip\+README-WARNING+.txt 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IPSEventLogMsg.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IPSEventLogMsg.dll.mui 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1124 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1148 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 944 vssvc.exe Token: SeRestorePrivilege 944 vssvc.exe Token: SeAuditPrivilege 944 vssvc.exe Token: SeBackupPrivilege 1944 wbengine.exe Token: SeRestorePrivilege 1944 wbengine.exe Token: SeSecurityPrivilege 1944 wbengine.exe Token: SeIncreaseQuotaPrivilege 1884 WMIC.exe Token: SeSecurityPrivilege 1884 WMIC.exe Token: SeTakeOwnershipPrivilege 1884 WMIC.exe Token: SeLoadDriverPrivilege 1884 WMIC.exe Token: SeSystemProfilePrivilege 1884 WMIC.exe Token: SeSystemtimePrivilege 1884 WMIC.exe Token: SeProfSingleProcessPrivilege 1884 WMIC.exe Token: SeIncBasePriorityPrivilege 1884 WMIC.exe Token: SeCreatePagefilePrivilege 1884 WMIC.exe Token: SeBackupPrivilege 1884 WMIC.exe Token: SeRestorePrivilege 1884 WMIC.exe Token: SeShutdownPrivilege 1884 WMIC.exe Token: SeDebugPrivilege 1884 WMIC.exe Token: SeSystemEnvironmentPrivilege 1884 WMIC.exe Token: SeRemoteShutdownPrivilege 1884 WMIC.exe Token: SeUndockPrivilege 1884 WMIC.exe Token: SeManageVolumePrivilege 1884 WMIC.exe Token: 33 1884 WMIC.exe Token: 34 1884 WMIC.exe Token: 35 1884 WMIC.exe Token: SeIncreaseQuotaPrivilege 1884 WMIC.exe Token: SeSecurityPrivilege 1884 WMIC.exe Token: SeTakeOwnershipPrivilege 1884 WMIC.exe Token: SeLoadDriverPrivilege 1884 WMIC.exe Token: SeSystemProfilePrivilege 1884 WMIC.exe Token: SeSystemtimePrivilege 1884 WMIC.exe Token: SeProfSingleProcessPrivilege 1884 WMIC.exe Token: SeIncBasePriorityPrivilege 1884 WMIC.exe Token: SeCreatePagefilePrivilege 1884 WMIC.exe Token: SeBackupPrivilege 1884 WMIC.exe Token: SeRestorePrivilege 1884 WMIC.exe Token: SeShutdownPrivilege 1884 WMIC.exe Token: SeDebugPrivilege 1884 WMIC.exe Token: SeSystemEnvironmentPrivilege 1884 WMIC.exe Token: SeRemoteShutdownPrivilege 1884 WMIC.exe Token: SeUndockPrivilege 1884 WMIC.exe Token: SeManageVolumePrivilege 1884 WMIC.exe Token: 33 1884 WMIC.exe Token: 34 1884 WMIC.exe Token: 35 1884 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1480 1148 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe 28 PID 1148 wrote to memory of 1480 1148 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe 28 PID 1148 wrote to memory of 1480 1148 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe 28 PID 1148 wrote to memory of 1480 1148 73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe 28 PID 1480 wrote to memory of 1124 1480 cmd.exe 30 PID 1480 wrote to memory of 1124 1480 cmd.exe 30 PID 1480 wrote to memory of 1124 1480 cmd.exe 30 PID 1480 wrote to memory of 2020 1480 cmd.exe 33 PID 1480 wrote to memory of 2020 1480 cmd.exe 33 PID 1480 wrote to memory of 2020 1480 cmd.exe 33 PID 1480 wrote to memory of 1884 1480 cmd.exe 37 PID 1480 wrote to memory of 1884 1480 cmd.exe 37 PID 1480 wrote to memory of 1884 1480 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe"C:\Users\Admin\AppData\Local\Temp\73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe"C:\Users\Admin\AppData\Local\Temp\73772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0.exe" n11482⤵PID:1080
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1124
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:2020
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:944
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1056
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:660
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1132