Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:22
Static task
static1
Behavioral task
behavioral1
Sample
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe
Resource
win10v2004-20221111-en
General
-
Target
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe
-
Size
364KB
-
MD5
54a2c676671f6ddbb2177bf8e890acd0
-
SHA1
884cfa603a2b4e79d6fe2f41d102e6b55ee2de59
-
SHA256
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403
-
SHA512
fab5630b95bd11cadaa2179f0add2946b2185d5594251762d2c00f5cd0f86877e3fe7a47b46b6172865aa30ffd743ea218b3b5584124dbd5e8dc7a6a7623f2c9
-
SSDEEP
6144:FC4m9hjy766vocAXRXi1s4dKNLGEbhSBr29lW7XczExw4Rqo:zm9hjR6A7hXEcNLtSBybW7cO7oo
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\fek2B36.tmp acprotect -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\afd3b0e.exe explorer.exe -
Loads dropped DLL 1 IoCs
Processes:
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exepid process 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\afd3b0e = "C:\\Users\\Admin\\AppData\\Roaming\\afd3b0e.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*fd3b0e = "C:\\Users\\Admin\\AppData\\Roaming\\afd3b0e.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\afd3b0 = "C:\\afd3b0e\\afd3b0e.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*fd3b0 = "C:\\afd3b0e\\afd3b0e.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exedescription pid process target process PID 852 set thread context of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1916 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
explorer.exepid process 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exeexplorer.exepid process 664 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe 1640 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1088 vssvc.exe Token: SeRestorePrivilege 1088 vssvc.exe Token: SeAuditPrivilege 1088 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exepid process 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.execd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exeexplorer.exedescription pid process target process PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 852 wrote to memory of 664 852 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe PID 664 wrote to memory of 1640 664 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe explorer.exe PID 664 wrote to memory of 1640 664 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe explorer.exe PID 664 wrote to memory of 1640 664 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe explorer.exe PID 664 wrote to memory of 1640 664 cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe explorer.exe PID 1640 wrote to memory of 800 1640 explorer.exe svchost.exe PID 1640 wrote to memory of 800 1640 explorer.exe svchost.exe PID 1640 wrote to memory of 800 1640 explorer.exe svchost.exe PID 1640 wrote to memory of 800 1640 explorer.exe svchost.exe PID 1640 wrote to memory of 1916 1640 explorer.exe vssadmin.exe PID 1640 wrote to memory of 1916 1640 explorer.exe vssadmin.exe PID 1640 wrote to memory of 1916 1640 explorer.exe vssadmin.exe PID 1640 wrote to memory of 1916 1640 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe"C:\Users\Admin\AppData\Local\Temp\cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe"C:\Users\Admin\AppData\Local\Temp\cd9681cfe1ef76bf46c079e4de23b7ba72bce3929585fae08e0a62937e38d403.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\syswow64\svchost.exe-k netsvcs4⤵PID:800
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:1916
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9