Analysis
-
max time kernel
165s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:02
Static task
static1
Behavioral task
behavioral1
Sample
Informe.Pdf _____________________________________________________________.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Informe.Pdf _____________________________________________________________.exe
Resource
win10v2004-20221111-en
General
-
Target
Informe.Pdf _____________________________________________________________.exe
-
Size
531KB
-
MD5
400d4d727950f4d6de451115b8c4cfc1
-
SHA1
e97b06dc654b70c6c117e7b2e91c9916a06e85a4
-
SHA256
ee177b068a2ac964536637fe4f04ff2deed524e981e69f5cceb2e0dd935c3f65
-
SHA512
0d2d90ed3bef2f321629e63e672855ab9d4c3015970b35990147bdc14c87e657ca6c4178402f77f6e0d35ef82ce338c499b634faf928590d4717ef28d535d281
-
SSDEEP
6144:LUv7JBskamattpI16Mu4isYwNMQ9PRKeIXIRTjv1ECkrQUK:AvqNsieIk3v1eUf
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eqotmnyv = "C:\\Windows\\yxymunag.exe" explorer.exe -
Processes:
Informe.Pdf _____________________________________________________________.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Informe.Pdf _____________________________________________________________.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Informe.Pdf _____________________________________________________________.exeInforme.Pdf _____________________________________________________________.exedescription pid process target process PID 1256 set thread context of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 4464 set thread context of 4288 4464 Informe.Pdf _____________________________________________________________.exe explorer.exe -
Drops file in Windows directory 2 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\yxymunag.exe explorer.exe File created C:\Windows\yxymunag.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4928 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 3600 vssvc.exe Token: SeRestorePrivilege 3600 vssvc.exe Token: SeAuditPrivilege 3600 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Informe.Pdf _____________________________________________________________.exepid process 1256 Informe.Pdf _____________________________________________________________.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Informe.Pdf _____________________________________________________________.exeInforme.Pdf _____________________________________________________________.exeexplorer.exedescription pid process target process PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 1256 wrote to memory of 4464 1256 Informe.Pdf _____________________________________________________________.exe Informe.Pdf _____________________________________________________________.exe PID 4464 wrote to memory of 4288 4464 Informe.Pdf _____________________________________________________________.exe explorer.exe PID 4464 wrote to memory of 4288 4464 Informe.Pdf _____________________________________________________________.exe explorer.exe PID 4464 wrote to memory of 4288 4464 Informe.Pdf _____________________________________________________________.exe explorer.exe PID 4464 wrote to memory of 4288 4464 Informe.Pdf _____________________________________________________________.exe explorer.exe PID 4288 wrote to memory of 4928 4288 explorer.exe vssadmin.exe PID 4288 wrote to memory of 4928 4288 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Informe.Pdf _____________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Informe.Pdf _____________________________________________________________.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Informe.Pdf _____________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Informe.Pdf _____________________________________________________________.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:4928
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD536ad0d6ee950275d288480e24f812bfd
SHA19dd2572045452dcff3bb8062314817b5b57e84b5
SHA256d06e19904d9a5b3873ded58d05d83a9c78789935522f4b3b838d1b5d456f7e0c
SHA51238dfdcc7841edcee3a6f08d78bbe1a1a43954c5f283996d266d9f0d0e2de66ec67e1ac5a5663ef774ba115c86a253af7586677814f7ebfa6eeb43387b2f04390