Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 03:57
Static task
static1
Behavioral task
behavioral1
Sample
OlympicDestroyer.exe
Resource
win7-20230703-en
General
-
Target
OlympicDestroyer.exe
-
Size
1.8MB
-
MD5
cfdd16225e67471f5ef54cab9b3a5558
-
SHA1
26de43cc558a4e0e60eddd4dc9321bcb5a0a181c
-
SHA256
edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9
-
SHA512
e1855a872f4db7c17eb22130d9cb205eddde641f1b39ea5de97dfb762fc97dc2347bc6e6e88b9c5a303e1540b4b4bdb19c839c7d3e237348adbfa4b942f24adb
-
SSDEEP
49152:R9dnjRSnRMWHrVDoqNcVhcAwARGcWRrLy3pNq:3dVSRMUrVDEVHLRGdRrLy5N
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Clears Windows event logs 1 TTPs 2 IoCs
pid Process 4468 wevtutil.exe 260 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 636 bcdedit.exe 1932 bcdedit.exe -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/memory/5004-150-0x0000000180000000-0x000000018002B000-memory.dmp mimikatz -
pid Process 980 wbadmin.exe -
Executes dropped EXE 3 IoCs
pid Process 4072 bvcsm.exe 5004 djumn.exe 3524 _sfv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2636 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5004 djumn.exe 5004 djumn.exe 5004 djumn.exe 5004 djumn.exe 5004 djumn.exe 5004 djumn.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1276 OlympicDestroyer.exe Token: SeSecurityPrivilege 1276 OlympicDestroyer.exe Token: SeTakeOwnershipPrivilege 1276 OlympicDestroyer.exe Token: SeLoadDriverPrivilege 1276 OlympicDestroyer.exe Token: SeSystemProfilePrivilege 1276 OlympicDestroyer.exe Token: SeSystemtimePrivilege 1276 OlympicDestroyer.exe Token: SeProfSingleProcessPrivilege 1276 OlympicDestroyer.exe Token: SeIncBasePriorityPrivilege 1276 OlympicDestroyer.exe Token: SeCreatePagefilePrivilege 1276 OlympicDestroyer.exe Token: SeBackupPrivilege 1276 OlympicDestroyer.exe Token: SeRestorePrivilege 1276 OlympicDestroyer.exe Token: SeShutdownPrivilege 1276 OlympicDestroyer.exe Token: SeDebugPrivilege 1276 OlympicDestroyer.exe Token: SeSystemEnvironmentPrivilege 1276 OlympicDestroyer.exe Token: SeRemoteShutdownPrivilege 1276 OlympicDestroyer.exe Token: SeUndockPrivilege 1276 OlympicDestroyer.exe Token: SeManageVolumePrivilege 1276 OlympicDestroyer.exe Token: 33 1276 OlympicDestroyer.exe Token: 34 1276 OlympicDestroyer.exe Token: 35 1276 OlympicDestroyer.exe Token: 36 1276 OlympicDestroyer.exe Token: SeDebugPrivilege 5004 djumn.exe Token: SeShutdownPrivilege 3524 _sfv.exe Token: SeBackupPrivilege 3000 vssvc.exe Token: SeRestorePrivilege 3000 vssvc.exe Token: SeAuditPrivilege 3000 vssvc.exe Token: SeBackupPrivilege 1016 wbengine.exe Token: SeRestorePrivilege 1016 wbengine.exe Token: SeSecurityPrivilege 1016 wbengine.exe Token: SeSecurityPrivilege 4468 wevtutil.exe Token: SeBackupPrivilege 4468 wevtutil.exe Token: SeSecurityPrivilege 260 wevtutil.exe Token: SeBackupPrivilege 260 wevtutil.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1276 wrote to memory of 4072 1276 OlympicDestroyer.exe 86 PID 1276 wrote to memory of 4072 1276 OlympicDestroyer.exe 86 PID 1276 wrote to memory of 4072 1276 OlympicDestroyer.exe 86 PID 1276 wrote to memory of 5004 1276 OlympicDestroyer.exe 87 PID 1276 wrote to memory of 5004 1276 OlympicDestroyer.exe 87 PID 1276 wrote to memory of 3524 1276 OlympicDestroyer.exe 88 PID 1276 wrote to memory of 3524 1276 OlympicDestroyer.exe 88 PID 1276 wrote to memory of 3524 1276 OlympicDestroyer.exe 88 PID 3524 wrote to memory of 3036 3524 _sfv.exe 89 PID 3524 wrote to memory of 3036 3524 _sfv.exe 89 PID 3036 wrote to memory of 2636 3036 cmd.exe 91 PID 3036 wrote to memory of 2636 3036 cmd.exe 91 PID 3524 wrote to memory of 3952 3524 _sfv.exe 94 PID 3524 wrote to memory of 3952 3524 _sfv.exe 94 PID 3952 wrote to memory of 980 3952 cmd.exe 96 PID 3952 wrote to memory of 980 3952 cmd.exe 96 PID 3524 wrote to memory of 3096 3524 _sfv.exe 100 PID 3524 wrote to memory of 3096 3524 _sfv.exe 100 PID 3096 wrote to memory of 636 3096 cmd.exe 102 PID 3096 wrote to memory of 636 3096 cmd.exe 102 PID 3096 wrote to memory of 1932 3096 cmd.exe 103 PID 3096 wrote to memory of 1932 3096 cmd.exe 103 PID 3524 wrote to memory of 2596 3524 _sfv.exe 104 PID 3524 wrote to memory of 2596 3524 _sfv.exe 104 PID 2596 wrote to memory of 4468 2596 cmd.exe 106 PID 2596 wrote to memory of 4468 2596 cmd.exe 106 PID 3524 wrote to memory of 2808 3524 _sfv.exe 107 PID 3524 wrote to memory of 2808 3524 _sfv.exe 107 PID 2808 wrote to memory of 260 2808 cmd.exe 109 PID 2808 wrote to memory of 260 2808 cmd.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\OlympicDestroyer.exe"C:\Users\Admin\AppData\Local\Temp\OlympicDestroyer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\bvcsm.exe123 \\.\pipe\A5698C4D-44D1-4D02-9EA4-75B20272FE742⤵
- Executes dropped EXE
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\djumn.exe123 \\.\pipe\A5C145AD-A612-4CB6-9284-DC8A2B7AA55B2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\_sfv.exe"C:\Users\Admin\AppData\Local\Temp\_sfv.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\Windows\system32\vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\Windows\system32\vssadmin.exec:\Windows\system32\vssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin.exe delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet4⤵
- Deletes backup catalog
PID:980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:636
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:1932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wevtutil.exe cl System3⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl System4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wevtutil.exe cl Security3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:260
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD53c0d740347b0362331c882c2dee96dbf
SHA18350e06f52e5c660bb416b03edb6a5ddc50c3a59
SHA256ae9a4e244a9b3c77d489dee8aeaf35a7c3ba31b210e76d81ef2e91790f052c85
SHA512a701f94b9cdebce6eff2f82552ec7554bf10d99019f8bcd6871ebca804d7519bdcfa3806ac7c7d8e604c3259c61c58b905293fa641c092a8fca8245f91eb0f8f
-
Filesize
36KB
MD53c0d740347b0362331c882c2dee96dbf
SHA18350e06f52e5c660bb416b03edb6a5ddc50c3a59
SHA256ae9a4e244a9b3c77d489dee8aeaf35a7c3ba31b210e76d81ef2e91790f052c85
SHA512a701f94b9cdebce6eff2f82552ec7554bf10d99019f8bcd6871ebca804d7519bdcfa3806ac7c7d8e604c3259c61c58b905293fa641c092a8fca8245f91eb0f8f
-
Filesize
751KB
MD54f43f03783f9789f804dcf9b9474fa6d
SHA1492d4a4a74099074e26b5dffd0d15434009ccfd9
SHA25619ab44a1343db19741b0e0b06bacce55990b6c8f789815daaf3476e0cc30ebea
SHA512645c2f0a1342732b86a45403fb8b1343bcc18c015c9918d2edf118bbb210fead98aa21f1b66ac5faabd0542583d74e158fbac6d5f0d49827f4eeb58c8ebafd6d
-
Filesize
751KB
MD54f43f03783f9789f804dcf9b9474fa6d
SHA1492d4a4a74099074e26b5dffd0d15434009ccfd9
SHA25619ab44a1343db19741b0e0b06bacce55990b6c8f789815daaf3476e0cc30ebea
SHA512645c2f0a1342732b86a45403fb8b1343bcc18c015c9918d2edf118bbb210fead98aa21f1b66ac5faabd0542583d74e158fbac6d5f0d49827f4eeb58c8ebafd6d
-
Filesize
277KB
MD5d9c37b937ffde812ae15de885913e101
SHA1ed1cd9e086923797fe2e5fe8ff19685bd2a40072
SHA256f188abc33d351c2254d794b525c5a8b79ea78acd3050cd8d27d3ecfc568c2936
SHA512164f45f3f8336ab450e119c716c30168c8115d5bdac7d220ea6f98a6889eee045092d163e54c2851a378a5d4877e913a342333c8bd0ab5615e34c40ca75e2877
-
Filesize
277KB
MD5d9c37b937ffde812ae15de885913e101
SHA1ed1cd9e086923797fe2e5fe8ff19685bd2a40072
SHA256f188abc33d351c2254d794b525c5a8b79ea78acd3050cd8d27d3ecfc568c2936
SHA512164f45f3f8336ab450e119c716c30168c8115d5bdac7d220ea6f98a6889eee045092d163e54c2851a378a5d4877e913a342333c8bd0ab5615e34c40ca75e2877