Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
E_WIN.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
E_WIN.exe
Resource
win10v2004-20221111-en
General
-
Target
E_WIN.exe
-
Size
92KB
-
MD5
7cdc8057b3fe13b069b8db93fdde1764
-
SHA1
8ddd3c69fe3935e4903a2b397bc6f0de772a1bcb
-
SHA256
393a7a313548a4edc025fb47c6c8e614ecc2b41db880ecb59f20cf238e9a864c
-
SHA512
7a7778b03a681bad08722019d27c2ca56609cbe6ec6e976b2d08e402b7ec5f2c7ad7d935632c0958b15b42d3dd066b1bd03707a778d77592a29b92adae684801
-
SSDEEP
1536:y8JknEUnj2zfGN2/PEiTsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2XsfzK7g:ynlnj2S+hTsrQLOJgY8Zp8LHD4XWaNHY
Malware Config
Extracted
C:\Restore-My-Files.txt
darkylock
1E6cvG6iEbufvYspsDa3XQ3WJgEMvRTm9i
Signatures
-
DarkyLock
Ransomware family first seen in July 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
E_WIN.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\CompareCopy.tiff E_WIN.exe File renamed C:\Users\Admin\Pictures\CompareCopy.tiff => C:\Users\Admin\Pictures\CompareCopy.tiff.darky E_WIN.exe File opened for modification C:\Users\Admin\Pictures\CompareCopy.tiff.darky E_WIN.exe File opened for modification C:\Users\Admin\Pictures\OpenAssert.tiff E_WIN.exe File renamed C:\Users\Admin\Pictures\OpenAssert.tiff => C:\Users\Admin\Pictures\OpenAssert.tiff.darky E_WIN.exe File opened for modification C:\Users\Admin\Pictures\OpenAssert.tiff.darky E_WIN.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
E_WIN.exedescription ioc process File opened (read-only) \??\Q: E_WIN.exe File opened (read-only) \??\R: E_WIN.exe File opened (read-only) \??\H: E_WIN.exe File opened (read-only) \??\J: E_WIN.exe File opened (read-only) \??\X: E_WIN.exe File opened (read-only) \??\F: E_WIN.exe File opened (read-only) \??\G: E_WIN.exe File opened (read-only) \??\L: E_WIN.exe File opened (read-only) \??\E: E_WIN.exe File opened (read-only) \??\T: E_WIN.exe File opened (read-only) \??\U: E_WIN.exe File opened (read-only) \??\A: E_WIN.exe File opened (read-only) \??\S: E_WIN.exe File opened (read-only) \??\B: E_WIN.exe File opened (read-only) \??\I: E_WIN.exe File opened (read-only) \??\O: E_WIN.exe File opened (read-only) \??\K: E_WIN.exe File opened (read-only) \??\Z: E_WIN.exe File opened (read-only) \??\V: E_WIN.exe File opened (read-only) \??\W: E_WIN.exe File opened (read-only) \??\Y: E_WIN.exe File opened (read-only) \??\P: E_WIN.exe File opened (read-only) \??\N: E_WIN.exe File opened (read-only) \??\M: E_WIN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 460 vssadmin.exe 1704 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
E_WIN.exepid process 968 E_WIN.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1752 vssvc.exe Token: SeRestorePrivilege 1752 vssvc.exe Token: SeAuditPrivilege 1752 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
E_WIN.execmd.execmd.exedescription pid process target process PID 968 wrote to memory of 996 968 E_WIN.exe cmd.exe PID 968 wrote to memory of 996 968 E_WIN.exe cmd.exe PID 968 wrote to memory of 996 968 E_WIN.exe cmd.exe PID 968 wrote to memory of 996 968 E_WIN.exe cmd.exe PID 996 wrote to memory of 1704 996 cmd.exe vssadmin.exe PID 996 wrote to memory of 1704 996 cmd.exe vssadmin.exe PID 996 wrote to memory of 1704 996 cmd.exe vssadmin.exe PID 968 wrote to memory of 1920 968 E_WIN.exe cmd.exe PID 968 wrote to memory of 1920 968 E_WIN.exe cmd.exe PID 968 wrote to memory of 1920 968 E_WIN.exe cmd.exe PID 968 wrote to memory of 1920 968 E_WIN.exe cmd.exe PID 1920 wrote to memory of 460 1920 cmd.exe vssadmin.exe PID 1920 wrote to memory of 460 1920 cmd.exe vssadmin.exe PID 1920 wrote to memory of 460 1920 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E_WIN.exe"C:\Users\Admin\AppData\Local\Temp\E_WIN.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:460
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752