Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 06:46
Static task
static1
Behavioral task
behavioral1
Sample
Processing.Pdf____________________________________________________________.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Processing.Pdf____________________________________________________________.exe
Resource
win10v2004-20220812-en
General
-
Target
Processing.Pdf____________________________________________________________.exe
-
Size
474KB
-
MD5
7e3556dc9dc56ef11af7276854f404c8
-
SHA1
26f676d0a6a0057fe6aa35a0d025c478d8e05741
-
SHA256
efd29f1af6c5e828bc4c1c980ab22ddc0a89c0c7813bf8075b8b8943edc19e5c
-
SHA512
d2a5b2c2ed9f628d2c85bac66eeb6af7d19d1b5baed8577acf83701d08b377c47ff3f00a5e590b96136cfab887c15d62622f54a56cc3dd23a507b985fd288bb2
-
SSDEEP
6144:dipL4qsxpzEOqcQLO8eNpOsYZqQJgOFATNFadd5G/c9FhkZJh4NCf0oxAOQPTRpD:d6UZbzfZmswqfNFQDuJhEJxR8L0
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ybufmvov = "C:\\Windows\\etetadul.exe" explorer.exe -
Processes:
Processing.Pdf____________________________________________________________.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Processing.Pdf____________________________________________________________.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Processing.Pdf____________________________________________________________.exeProcessing.Pdf____________________________________________________________.exedescription pid process target process PID 620 set thread context of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 856 set thread context of 1684 856 Processing.Pdf____________________________________________________________.exe explorer.exe -
Drops file in Windows directory 2 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\etetadul.exe explorer.exe File created C:\Windows\etetadul.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1752 vssadmin.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Processing.Pdf____________________________________________________________.exepid process 620 Processing.Pdf____________________________________________________________.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1644 vssvc.exe Token: SeRestorePrivilege 1644 vssvc.exe Token: SeAuditPrivilege 1644 vssvc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Processing.Pdf____________________________________________________________.exeProcessing.Pdf____________________________________________________________.exeexplorer.exedescription pid process target process PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 620 wrote to memory of 856 620 Processing.Pdf____________________________________________________________.exe Processing.Pdf____________________________________________________________.exe PID 856 wrote to memory of 1684 856 Processing.Pdf____________________________________________________________.exe explorer.exe PID 856 wrote to memory of 1684 856 Processing.Pdf____________________________________________________________.exe explorer.exe PID 856 wrote to memory of 1684 856 Processing.Pdf____________________________________________________________.exe explorer.exe PID 856 wrote to memory of 1684 856 Processing.Pdf____________________________________________________________.exe explorer.exe PID 856 wrote to memory of 1684 856 Processing.Pdf____________________________________________________________.exe explorer.exe PID 1684 wrote to memory of 1752 1684 explorer.exe vssadmin.exe PID 1684 wrote to memory of 1752 1684 explorer.exe vssadmin.exe PID 1684 wrote to memory of 1752 1684 explorer.exe vssadmin.exe PID 1684 wrote to memory of 1752 1684 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Processing.Pdf____________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Processing.Pdf____________________________________________________________.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\Processing.Pdf____________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Processing.Pdf____________________________________________________________.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:1752
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD5c73cb670aa24161d8549ca421283a748
SHA101680d22569d2b096b7cec397a53d27cace3b4fd
SHA256347e3eb5391e4fc911efd072bd0d98df6b567c9fbdc94e4d7d1fdec928db77a5
SHA512cb60059650d5d5f88b52c1a38f47ba276fa245c80005ae3382e09409dbc3e22ec5684558d3d1627c4290d13d20544526f2e7ebcf985098fcdacf0584b234334f