Analysis
-
max time kernel
152s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe
Resource
win10v2004-20221111-en
General
-
Target
1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe
-
Size
890KB
-
MD5
edeb5dea8ad10ae0102a5888991036b9
-
SHA1
8ba3ed9ab88b8fd8c77ede0f304deeec8cef843d
-
SHA256
1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3
-
SHA512
7bc2c3ffa882abf8b45cdd4df0677aee2495c453b3fcfc486a5321ff14b62cce35566efce579f5773164cdc55d39e9e97fa57833b337d1e7def888d13838cecd
-
SSDEEP
12288:3GjEJ5DY3YJW1QNCfFKVIm3vLZabIIsOihKlz3wp0dN2ZENtLfiIPDtOkYl9a:xn9HI8Ebdihs3K0HPN57PxOM
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-hlvcmzk.txt
http://kph3onblkthy4z37.onion.cab
http://kph3onblkthy4z37.tor2web.org
http://kph3onblkthy4z37.onion/
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 2 IoCs
pid Process 836 vhbumzm.exe 776 vhbumzm.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1776 set thread context of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 836 set thread context of 776 836 vhbumzm.exe 31 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-hlvcmzk.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-hlvcmzk.bmp svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1328 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 776 vhbumzm.exe 776 vhbumzm.exe 776 vhbumzm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 vhbumzm.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 1776 wrote to memory of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 1776 wrote to memory of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 1776 wrote to memory of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 1776 wrote to memory of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 1776 wrote to memory of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 1776 wrote to memory of 1328 1776 1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe 28 PID 1116 wrote to memory of 836 1116 taskeng.exe 30 PID 1116 wrote to memory of 836 1116 taskeng.exe 30 PID 1116 wrote to memory of 836 1116 taskeng.exe 30 PID 1116 wrote to memory of 836 1116 taskeng.exe 30 PID 836 wrote to memory of 776 836 vhbumzm.exe 31 PID 836 wrote to memory of 776 836 vhbumzm.exe 31 PID 836 wrote to memory of 776 836 vhbumzm.exe 31 PID 836 wrote to memory of 776 836 vhbumzm.exe 31 PID 836 wrote to memory of 776 836 vhbumzm.exe 31 PID 836 wrote to memory of 776 836 vhbumzm.exe 31 PID 836 wrote to memory of 776 836 vhbumzm.exe 31 PID 776 wrote to memory of 596 776 vhbumzm.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe"C:\Users\Admin\AppData\Local\Temp\1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exeC:\Users\Admin\AppData\Local\Temp\1d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops file in Program Files directory
PID:596
-
C:\Windows\system32\taskeng.exetaskeng.exe {7236723C-1B28-48D2-A1A1-2B43A4EB8CB5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\vhbumzm.exeC:\Users\Admin\AppData\Local\Temp\vhbumzm.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\vhbumzm.exeC:\Users\Admin\AppData\Local\Temp\vhbumzm.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD57663822e0f44d826e6aa81807d57bda5
SHA100d673150a1c42a46b0e6e5b3e35fa1a5aa8ac87
SHA25623a5334a26d4386e632cf73ba47040ca36f65dc480f2480c1861922e5120f0ce
SHA51215ceb8bf9e61420da17d9349ea763393332a06b61eff6135953ecaaba5746c6c6e66ebcb8ce6970f4097e2e91e3f4f69230ec237c52bbcca5605d927db8c1509
-
Filesize
654B
MD57663822e0f44d826e6aa81807d57bda5
SHA100d673150a1c42a46b0e6e5b3e35fa1a5aa8ac87
SHA25623a5334a26d4386e632cf73ba47040ca36f65dc480f2480c1861922e5120f0ce
SHA51215ceb8bf9e61420da17d9349ea763393332a06b61eff6135953ecaaba5746c6c6e66ebcb8ce6970f4097e2e91e3f4f69230ec237c52bbcca5605d927db8c1509
-
Filesize
890KB
MD5edeb5dea8ad10ae0102a5888991036b9
SHA18ba3ed9ab88b8fd8c77ede0f304deeec8cef843d
SHA2561d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3
SHA5127bc2c3ffa882abf8b45cdd4df0677aee2495c453b3fcfc486a5321ff14b62cce35566efce579f5773164cdc55d39e9e97fa57833b337d1e7def888d13838cecd
-
Filesize
890KB
MD5edeb5dea8ad10ae0102a5888991036b9
SHA18ba3ed9ab88b8fd8c77ede0f304deeec8cef843d
SHA2561d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3
SHA5127bc2c3ffa882abf8b45cdd4df0677aee2495c453b3fcfc486a5321ff14b62cce35566efce579f5773164cdc55d39e9e97fa57833b337d1e7def888d13838cecd
-
Filesize
890KB
MD5edeb5dea8ad10ae0102a5888991036b9
SHA18ba3ed9ab88b8fd8c77ede0f304deeec8cef843d
SHA2561d8c57cb4103be45549b6c48aa4ea55b3baac28a0033d681d7842efce4a28cf3
SHA5127bc2c3ffa882abf8b45cdd4df0677aee2495c453b3fcfc486a5321ff14b62cce35566efce579f5773164cdc55d39e9e97fa57833b337d1e7def888d13838cecd