Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-02-2023 19:39
Static task
static1
Behavioral task
behavioral1
Sample
f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe
Resource
win10v2004-20221111-en
General
-
Target
f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe
-
Size
859KB
-
MD5
30927f9bc15d99900d377747494f5c60
-
SHA1
b34c12bafd26ae92d8217eb16a5a846c5ced92e2
-
SHA256
f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53
-
SHA512
e8e59cacb3c24e4f8876d618bb9510d8a6c6b5a98201f79d367a6874804849c7cee403519e776f004f4bd69ed7ba680de9253ff70a0f8d48ecc52a29a65fa5a1
-
SSDEEP
12288:l0v5NBjYIR0yhfVf/Wc7OhgkYa5EpaHe7yCfxnR1P4GfcM53ICDQhlquDXXCM:l0rBjVOc7OUaGv7yazgqDCIElqK
Malware Config
Extracted
C:\instructions_read_me.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompareEnable.png => C:\Users\Admin\Pictures\CompareEnable.png.2cp5g8lpk f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File renamed C:\Users\Admin\Pictures\DismountExpand.raw => C:\Users\Admin\Pictures\DismountExpand.raw.2cp5g8lpk f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File renamed C:\Users\Admin\Pictures\FindHide.raw => C:\Users\Admin\Pictures\FindHide.raw.2cp5g8lpk f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File renamed C:\Users\Admin\Pictures\ResolveCompress.tif => C:\Users\Admin\Pictures\ResolveCompress.tif.2cp5g8lpk f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\FreeCell\it-IT\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00254_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Mozilla Firefox\nss3.dll f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SEQCHK10.DLL f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0172193.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_resources14.xss f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105276.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdasqlr.dll f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0177257.JPG f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieproxy.dll f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcfr.dll f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File created C:\Program Files\Microsoft Games\Purble Place\en-US\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0172035.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADVCMP.DIC f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceca35.dll f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00021_.GIF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSLM.DLL f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00449_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\LICENSE f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\jvm.lib f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\WMPMediaSharing.dll.mui f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099172.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145361.JPG f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Windows Journal\en-US\NBMapTIP.dll.mui f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmpnetwk.exe.mui f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\drag.png f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185806.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_es-419.dll f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04235_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD10972_.GIF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00116_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178348.JPG f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File created C:\Program Files\Microsoft Games\Minesweeper\ja-JP\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00274_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CMNTY_01.MID f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\DVD Maker\fieldswitch.ax f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Median.thmx f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SENDTO.DLL f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00172_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\FormatRequest.xlsx f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSODCW.DLL f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01015_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Internet Explorer\jsprofilerui.dll f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107482.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152702.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File created C:\Program Files\Microsoft Games\instructions_read_me.txt f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00372_.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153514.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195254.WMF f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\NBMapTIP.dll.mui f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1656 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.2cp5g8lpk\DefaultIcon f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.2cp5g8lpk f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.2cp5g8lpk\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 628 vssvc.exe Token: SeRestorePrivilege 628 vssvc.exe Token: SeAuditPrivilege 628 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1404 wrote to memory of 788 1404 f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe 28 PID 1404 wrote to memory of 788 1404 f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe 28 PID 1404 wrote to memory of 788 1404 f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe 28 PID 1404 wrote to memory of 788 1404 f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe 28 PID 788 wrote to memory of 1656 788 cmd.exe 30 PID 788 wrote to memory of 1656 788 cmd.exe 30 PID 788 wrote to memory of 1656 788 cmd.exe 30 PID 788 wrote to memory of 1656 788 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe"C:\Users\Admin\AppData\Local\Temp\f4f471241714fbf24a103f8a7fce00fecdf795dbf6edbc6420e34834cb93eb53.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1656
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:628