Analysis
-
max time kernel
84s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:55
Behavioral task
behavioral1
Sample
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe
Resource
win10v2004-20220812-en
General
-
Target
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe
-
Size
49KB
-
MD5
f9c31d3d243a5e6b7e9cf69cdf83426a
-
SHA1
0781bfd34b3b72e7e520800c23fc133ce4aff069
-
SHA256
2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618
-
SHA512
eaf57defc88e9103794c22f3bd686835c9689a40cc18bd0affe4fdae536aea7403c25be9c3a8e2b301e33ff0a4c8ce91756f1c74833fbf6e5c79d820a673fcfe
-
SSDEEP
768:aaQRffPB31aCytHLykiKPT3JATD2qBwV2ckjbnsb0Ah99De0YAD+eg0LBYL91Oe:aam318HxZATvnsblYO+eE
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\1044975534\+README-WARNING+.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 1544 wbadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tipresx.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\dicjp.bin 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InputPersonalization.exe.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\License.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\tipresx.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkObj.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\rtscom.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipTsf.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tipresx.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\micaut.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\tipresx.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tipresx.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mip.exe.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IpsMigrationPlugin.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\rtscom.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipBand.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\readme.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tabskb.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mshwLatin.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mip.exe.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IPSEventLogMsg.dll.mui 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 552 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1048 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 768 vssvc.exe Token: SeRestorePrivilege 768 vssvc.exe Token: SeAuditPrivilege 768 vssvc.exe Token: SeBackupPrivilege 1292 wbengine.exe Token: SeRestorePrivilege 1292 wbengine.exe Token: SeSecurityPrivilege 1292 wbengine.exe Token: SeIncreaseQuotaPrivilege 1716 WMIC.exe Token: SeSecurityPrivilege 1716 WMIC.exe Token: SeTakeOwnershipPrivilege 1716 WMIC.exe Token: SeLoadDriverPrivilege 1716 WMIC.exe Token: SeSystemProfilePrivilege 1716 WMIC.exe Token: SeSystemtimePrivilege 1716 WMIC.exe Token: SeProfSingleProcessPrivilege 1716 WMIC.exe Token: SeIncBasePriorityPrivilege 1716 WMIC.exe Token: SeCreatePagefilePrivilege 1716 WMIC.exe Token: SeBackupPrivilege 1716 WMIC.exe Token: SeRestorePrivilege 1716 WMIC.exe Token: SeShutdownPrivilege 1716 WMIC.exe Token: SeDebugPrivilege 1716 WMIC.exe Token: SeSystemEnvironmentPrivilege 1716 WMIC.exe Token: SeRemoteShutdownPrivilege 1716 WMIC.exe Token: SeUndockPrivilege 1716 WMIC.exe Token: SeManageVolumePrivilege 1716 WMIC.exe Token: 33 1716 WMIC.exe Token: 34 1716 WMIC.exe Token: 35 1716 WMIC.exe Token: SeIncreaseQuotaPrivilege 1716 WMIC.exe Token: SeSecurityPrivilege 1716 WMIC.exe Token: SeTakeOwnershipPrivilege 1716 WMIC.exe Token: SeLoadDriverPrivilege 1716 WMIC.exe Token: SeSystemProfilePrivilege 1716 WMIC.exe Token: SeSystemtimePrivilege 1716 WMIC.exe Token: SeProfSingleProcessPrivilege 1716 WMIC.exe Token: SeIncBasePriorityPrivilege 1716 WMIC.exe Token: SeCreatePagefilePrivilege 1716 WMIC.exe Token: SeBackupPrivilege 1716 WMIC.exe Token: SeRestorePrivilege 1716 WMIC.exe Token: SeShutdownPrivilege 1716 WMIC.exe Token: SeDebugPrivilege 1716 WMIC.exe Token: SeSystemEnvironmentPrivilege 1716 WMIC.exe Token: SeRemoteShutdownPrivilege 1716 WMIC.exe Token: SeUndockPrivilege 1716 WMIC.exe Token: SeManageVolumePrivilege 1716 WMIC.exe Token: 33 1716 WMIC.exe Token: 34 1716 WMIC.exe Token: 35 1716 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2016 1048 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe 27 PID 1048 wrote to memory of 2016 1048 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe 27 PID 1048 wrote to memory of 2016 1048 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe 27 PID 1048 wrote to memory of 2016 1048 2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe 27 PID 2016 wrote to memory of 552 2016 cmd.exe 29 PID 2016 wrote to memory of 552 2016 cmd.exe 29 PID 2016 wrote to memory of 552 2016 cmd.exe 29 PID 2016 wrote to memory of 1544 2016 cmd.exe 32 PID 2016 wrote to memory of 1544 2016 cmd.exe 32 PID 2016 wrote to memory of 1544 2016 cmd.exe 32 PID 2016 wrote to memory of 1716 2016 cmd.exe 36 PID 2016 wrote to memory of 1716 2016 cmd.exe 36 PID 2016 wrote to memory of 1716 2016 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe"C:\Users\Admin\AppData\Local\Temp\2762840efe0975a63ad5358c32c89f7dbd37ef5d3ccc690e1be7fc3dee18d618.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:552
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:1544
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:768
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1980
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1720
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1828