Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:22
Static task
static1
Behavioral task
behavioral1
Sample
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe
Resource
win10v2004-20220812-en
General
-
Target
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe
-
Size
147KB
-
MD5
8c6309eabacbf95f01cea9e1e84aad4c
-
SHA1
fe1e785fb4519f1e4ed15351b68b399185c17aad
-
SHA256
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0
-
SHA512
f5589942e45b8186207a398f90f394a6f5faf95aeb0dedd310c04cf7d66217b7823b117cde6c791d58e815da5946a730bcf6b615faceb5cabedd626205a2fc8f
-
SSDEEP
3072:b0zy6Iv9/7bKrnZ+OF2IBIW3FXfLedZTWrL6:wm667urnZxFjIW3xq
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bcf8801.exe explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\bcf880 = "C:\\bcf8801\\bcf8801.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*cf880 = "C:\\bcf8801\\bcf8801.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\bcf8801 = "C:\\Users\\Admin\\AppData\\Roaming\\bcf8801.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*cf8801 = "C:\\Users\\Admin\\AppData\\Roaming\\bcf8801.exe" explorer.exe -
Drops file in Windows directory 1 IoCs
Processes:
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exedescription ioc process File opened for modification C:\Windows\4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.INI 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1300 vssadmin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exeexplorer.exepid process 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe 1056 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1764 vssvc.exe Token: SeRestorePrivilege 1764 vssvc.exe Token: SeAuditPrivilege 1764 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exepid process 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exepid process 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exeexplorer.exedescription pid process target process PID 1200 wrote to memory of 1056 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe explorer.exe PID 1200 wrote to memory of 1056 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe explorer.exe PID 1200 wrote to memory of 1056 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe explorer.exe PID 1200 wrote to memory of 1056 1200 4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe explorer.exe PID 1056 wrote to memory of 2024 1056 explorer.exe svchost.exe PID 1056 wrote to memory of 2024 1056 explorer.exe svchost.exe PID 1056 wrote to memory of 2024 1056 explorer.exe svchost.exe PID 1056 wrote to memory of 2024 1056 explorer.exe svchost.exe PID 1056 wrote to memory of 1300 1056 explorer.exe vssadmin.exe PID 1056 wrote to memory of 1300 1056 explorer.exe vssadmin.exe PID 1056 wrote to memory of 1300 1056 explorer.exe vssadmin.exe PID 1056 wrote to memory of 1300 1056 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe"C:\Users\Admin\AppData\Local\Temp\4cdb404908c66dae742158bf14ad34d6fabe6124f9fe4f1dd37450a4e8422ff0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\syswow64\svchost.exe-k netsvcs3⤵PID:2024
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1300
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764