Analysis

  • max time kernel
    141s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2023 20:48

General

  • Target

    2016-02-03-EITest-Angler-EK-payload-HydraCrypt.bin.exe

  • Size

    164KB

  • MD5

    08b304d01220f9de63244b4666621bba

  • SHA1

    b7f9dd8ee3434b35fbb3395f69ff43fd5112a0c6

  • SHA256

    afd3b729cf99fb9ea441f42862a4835d1d6eeb36ee535f9b206e3a00382c972e

  • SHA512

    162cc0fb48615c67ce6e104ca462c41aba79bad0d5409e837b300cffc34a1c9bed63f603eee7091b93edfcd772d8ab1e180fcb3aae6b07fe24413b8505815ae9

  • SSDEEP

    3072:fHynAdzu0t5GtE13lkAB9z3KJZ3fCI1AjZ7yXgpiqQp:fHKautY3TzaJZarjZeXgpn

Malware Config

Signatures

  • HydraCrypt

    Relatively unsophisticated ransomware family based on leaked CrypBoss source code.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Interacts with shadow copies 2 TTPs 27 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2016-02-03-EITest-Angler-EK-payload-HydraCrypt.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\2016-02-03-EITest-Angler-EK-payload-HydraCrypt.bin.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\2016-02-03-EITest-Angler-EK-payload-HydraCrypt.bin.exe
      C:\Users\Admin\AppData\Local\Temp\2016-02-03-EITest-Angler-EK-payload-HydraCrypt.bin.exe
      2⤵
      • Modifies extensions of user files
      • Drops startup file
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C net stop vss
        3⤵
          PID:772
          • C:\Windows\SysWOW64\net.exe
            net stop vss
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:868
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop vss
              5⤵
                PID:1216
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /All
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:676
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin Delete Shadows /All
              4⤵
              • Interacts with shadow copies
              PID:1524
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1112
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic shadowcopy delete
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:808
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Z: /All
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin Delete Shadows /For=Z: /All
              4⤵
              • Interacts with shadow copies
              PID:848
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Y: /All
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1884
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin Delete Shadows /For=Y: /All
              4⤵
              • Interacts with shadow copies
              PID:296
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=X: /All
            3⤵
              PID:1008
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin Delete Shadows /For=X: /All
                4⤵
                • Interacts with shadow copies
                PID:1816
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=V: /All
              3⤵
                PID:484
                • C:\Windows\SysWOW64\vssadmin.exe
                  vssadmin Delete Shadows /For=V: /All
                  4⤵
                  • Interacts with shadow copies
                  PID:636
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=U: /All
                3⤵
                  PID:1632
                  • C:\Windows\SysWOW64\vssadmin.exe
                    vssadmin Delete Shadows /For=U: /All
                    4⤵
                    • Interacts with shadow copies
                    PID:1604
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=W: /All
                  3⤵
                    PID:952
                    • C:\Windows\SysWOW64\vssadmin.exe
                      vssadmin Delete Shadows /For=W: /All
                      4⤵
                      • Interacts with shadow copies
                      PID:1088
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=T: /All
                    3⤵
                      PID:1972
                      • C:\Windows\SysWOW64\vssadmin.exe
                        vssadmin Delete Shadows /For=T: /All
                        4⤵
                        • Interacts with shadow copies
                        PID:2004
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=S: /All
                      3⤵
                        PID:1204
                        • C:\Windows\SysWOW64\vssadmin.exe
                          vssadmin Delete Shadows /For=S: /All
                          4⤵
                          • Interacts with shadow copies
                          PID:1348
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=R: /All
                        3⤵
                          PID:2000
                          • C:\Windows\SysWOW64\vssadmin.exe
                            vssadmin Delete Shadows /For=R: /All
                            4⤵
                            • Interacts with shadow copies
                            PID:1488
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=Q: /All
                          3⤵
                            PID:948
                            • C:\Windows\SysWOW64\vssadmin.exe
                              vssadmin Delete Shadows /For=Q: /All
                              4⤵
                              • Interacts with shadow copies
                              PID:1920
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=P: /All
                            3⤵
                              PID:924
                              • C:\Windows\SysWOW64\vssadmin.exe
                                vssadmin Delete Shadows /For=P: /All
                                4⤵
                                • Interacts with shadow copies
                                PID:844
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=O: /All
                              3⤵
                                PID:1600
                                • C:\Windows\SysWOW64\vssadmin.exe
                                  vssadmin Delete Shadows /For=O: /All
                                  4⤵
                                  • Interacts with shadow copies
                                  PID:1472
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=N: /All
                                3⤵
                                  PID:1336
                                  • C:\Windows\SysWOW64\vssadmin.exe
                                    vssadmin Delete Shadows /For=N: /All
                                    4⤵
                                    • Interacts with shadow copies
                                    PID:1260
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=M: /All
                                  3⤵
                                    PID:528
                                    • C:\Windows\SysWOW64\vssadmin.exe
                                      vssadmin Delete Shadows /For=M: /All
                                      4⤵
                                      • Interacts with shadow copies
                                      PID:1028
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=L: /All
                                    3⤵
                                      PID:2008
                                      • C:\Windows\SysWOW64\vssadmin.exe
                                        vssadmin Delete Shadows /For=L: /All
                                        4⤵
                                        • Interacts with shadow copies
                                        PID:1000
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=K: /All
                                      3⤵
                                        PID:1628
                                        • C:\Windows\SysWOW64\vssadmin.exe
                                          vssadmin Delete Shadows /For=K: /All
                                          4⤵
                                          • Interacts with shadow copies
                                          PID:2120
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=J: /All
                                        3⤵
                                          PID:1572
                                          • C:\Windows\SysWOW64\vssadmin.exe
                                            vssadmin Delete Shadows /For=J: /All
                                            4⤵
                                            • Interacts with shadow copies
                                            PID:2148
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=I: /All
                                          3⤵
                                            PID:2056
                                            • C:\Windows\SysWOW64\vssadmin.exe
                                              vssadmin Delete Shadows /For=I: /All
                                              4⤵
                                              • Interacts with shadow copies
                                              PID:2204
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=H: /All
                                            3⤵
                                              PID:2088
                                              • C:\Windows\SysWOW64\vssadmin.exe
                                                vssadmin Delete Shadows /For=H: /All
                                                4⤵
                                                • Interacts with shadow copies
                                                PID:2216
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=G: /All
                                              3⤵
                                                PID:2128
                                                • C:\Windows\SysWOW64\vssadmin.exe
                                                  vssadmin Delete Shadows /For=G: /All
                                                  4⤵
                                                  • Interacts with shadow copies
                                                  PID:2252
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=F: /All
                                                3⤵
                                                  PID:2180
                                                  • C:\Windows\SysWOW64\vssadmin.exe
                                                    vssadmin Delete Shadows /For=F: /All
                                                    4⤵
                                                    • Interacts with shadow copies
                                                    PID:2316
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=E: /All
                                                  3⤵
                                                    PID:2224
                                                    • C:\Windows\SysWOW64\vssadmin.exe
                                                      vssadmin Delete Shadows /For=E: /All
                                                      4⤵
                                                      • Interacts with shadow copies
                                                      PID:2400
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=D: /All
                                                    3⤵
                                                      PID:2260
                                                      • C:\Windows\SysWOW64\vssadmin.exe
                                                        vssadmin Delete Shadows /For=D: /All
                                                        4⤵
                                                        • Interacts with shadow copies
                                                        PID:2484
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=C: /All
                                                      3⤵
                                                        PID:2280
                                                        • C:\Windows\SysWOW64\vssadmin.exe
                                                          vssadmin Delete Shadows /For=C: /All
                                                          4⤵
                                                          • Interacts with shadow copies
                                                          PID:2384
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=B: /All
                                                        3⤵
                                                          PID:2340
                                                          • C:\Windows\SysWOW64\vssadmin.exe
                                                            vssadmin Delete Shadows /For=B: /All
                                                            4⤵
                                                            • Interacts with shadow copies
                                                            PID:2536
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /For=A: /All
                                                          3⤵
                                                            PID:2368
                                                            • C:\Windows\SysWOW64\vssadmin.exe
                                                              vssadmin Delete Shadows /For=A: /All
                                                              4⤵
                                                              • Interacts with shadow copies
                                                              PID:2572
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 7972
                                                            3⤵
                                                            • Program crash
                                                            PID:2096
                                                      • C:\Windows\system32\conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe "-8506824032135155593630421923-469705759-6137301091508827591212962404682656589"
                                                        1⤵
                                                          PID:1216
                                                        • C:\Windows\system32\conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe "-9475992671378339094-5832242751180845862-213370082747187124918212332495356582"
                                                          1⤵
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:772
                                                        • C:\Windows\system32\vssvc.exe
                                                          C:\Windows\system32\vssvc.exe
                                                          1⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2544

                                                        Network

                                                        MITRE ATT&CK Enterprise v6

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\A6DSJQQJ\desktop.ini.hydracrypttmp_ID_869a271f

                                                          Filesize

                                                          67B

                                                          MD5

                                                          b4c2311fb5b666691d7109f5a7db2908

                                                          SHA1

                                                          f4ce151c375ce4a822fe1a01c7b67e102a29f3ec

                                                          SHA256

                                                          0847951242c7c44af41bd974264a5ff7d05f8f86eec606e9aa7019460bf321cd

                                                          SHA512

                                                          e59dc17d8436908c968935197e583d0616870953534d9f62ae9caf043da092f9ed175df38d86979f9f1a105e6520b2814978d47e553043d5d76a29984b338152

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VCT3UJZ1\desktop.ini.hydracrypt_ID_869a271f

                                                          Filesize

                                                          331B

                                                          MD5

                                                          791eacbdd2a9cbb9ac3c55c3e5f6aff7

                                                          SHA1

                                                          90096e9836c45a83bc2efd0a71c1720006ecd006

                                                          SHA256

                                                          ac8bcbef665f421aa8d4a2b1b2ad9cdc6e5d91ae29926d4e036354a0390e1675

                                                          SHA512

                                                          60981e15d62e35053bfedc25553c33024b5c09d620acba9b3729fc6500c755ff3fd42dd39678c94f2432c538c0f2878bfeded41342fe924621af0a9319d60759

                                                        • C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20230220_185731908.html.hydracrypttmp_ID_869a271f

                                                          Filesize

                                                          1.1MB

                                                          MD5

                                                          666355e96e7540a6f8f607c7767f89e2

                                                          SHA1

                                                          fe4c5a4e4ac89797834e444c2f4a86c4351bc4f9

                                                          SHA256

                                                          a7503edaed07bb5ce9fd1094f2fb268501d1c58ccfbe160369e59186c67c4e67

                                                          SHA512

                                                          f08f46d66a6231c19875bfd43ba509b90e50aea6fb757a7ba5562b4eaa3ee1d021390fe82268afb685fa8076db5f7d24aa0b0b19c554107aae498a0b184ec908

                                                        • C:\Users\Admin\AppData\Roaming\1$FUWW$FFHEX.dat

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          029c1ba05a0e18977bd30d7b620e762b

                                                          SHA1

                                                          a146f64b018f715a8b3572c26a0bbb6481f981d4

                                                          SHA256

                                                          219073cd0fe343361ac0ece187171c50ad2cf9b8c814bb21e2f3be6c09a32ce5

                                                          SHA512

                                                          653de12fab42742dc471c5e66738c585f1d035dc134e9d51b6670a9206f3ee0ce2d51d6765ec1b55e5baef7921c4c1beceea09fb8b7305b3f6a5371d83f73831

                                                        • C:\Users\Public\Videos\README_DECRYPT_HYDRA_ID_869a271f.txt

                                                          Filesize

                                                          915B

                                                          MD5

                                                          ec8a491fe3884746490f92171b930633

                                                          SHA1

                                                          16776e53d50c90d5eeaa29185d8e3a9c7b631365

                                                          SHA256

                                                          a94f02ee3488e12330293fd597a4cc8ca4602f3f3ee40b8d3c8240c8d90e97ca

                                                          SHA512

                                                          e017290c8a90da94f38e7651305f12e93f4e13d87630a8cd7fd9342e513892707ecaa2f28ca6a4a608752184cb91acce146e02ba97734ca3f4833868131e3577

                                                        • C:\Users\Public\Videos\README_DECRYPT_HYDRA_ID_869a271f.txt

                                                          Filesize

                                                          915B

                                                          MD5

                                                          ec8a491fe3884746490f92171b930633

                                                          SHA1

                                                          16776e53d50c90d5eeaa29185d8e3a9c7b631365

                                                          SHA256

                                                          a94f02ee3488e12330293fd597a4cc8ca4602f3f3ee40b8d3c8240c8d90e97ca

                                                          SHA512

                                                          e017290c8a90da94f38e7651305f12e93f4e13d87630a8cd7fd9342e513892707ecaa2f28ca6a4a608752184cb91acce146e02ba97734ca3f4833868131e3577

                                                        • memory/1260-61-0x00000000003E0000-0x00000000003E5000-memory.dmp

                                                          Filesize

                                                          20KB

                                                        • memory/1712-260-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-63-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-320-0x0000000000400000-0x000000000040E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/1712-64-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-66-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/1712-68-0x0000000000400000-0x000000000040E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/1712-69-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-680-0x0000000000400000-0x000000000040E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/1712-60-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-2396-0x0000000000400000-0x000000000040E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/1712-62-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-70-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-59-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-58-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-1292-0x0000000000400000-0x000000000040E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/1712-57-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-1865-0x0000000000400000-0x000000000040E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/1712-2292-0x0000000000400000-0x000000000040E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/1712-56-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-55-0x0000000000400000-0x0000000000978000-memory.dmp

                                                          Filesize

                                                          5.5MB

                                                        • memory/1712-54-0x0000000000300000-0x0000000000400000-memory.dmp

                                                          Filesize

                                                          1024KB