Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29-07-2023 12:42
Static task
static1
Behavioral task
behavioral1
Sample
test.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
test.zip
Resource
win10v2004-20230703-en
General
-
Target
test.zip
-
Size
178KB
-
MD5
637f1b621634196dd7628c5ce387da62
-
SHA1
c727727ed610d62da7e51d099f809a13f656e99e
-
SHA256
aebc7adbfa6abde961966f30524f8c2a12d2c21132a7d647983209c061d9885e
-
SHA512
0ceed157c8362e6f01b2f2d90f458008d0fc3d0b6721e7abcd61dcd89f24036e681b0e5a976aeea7eff6a8a012425b8024c4912661e81207559424ec8c2c8183
-
SSDEEP
3072:DdEZd15mu8QHZWzq6ifTvfy4WVmqbPmEd8N9NBmVKeM6z50zo4FEXMuxI:GP5WG62yZxbOEqHmhV10zwMr
Malware Config
Signatures
-
Matrix Ransomware 3 IoCs
Targeted ransomware with information collection and encryption functionality.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" test.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop//wallpaper.bit.png" test.exe File created C:\Users\Admin\Desktop\readme.rtf decryptor.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 2768 decryptor.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 test.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop//wallpaper.bit.png" test.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" test.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1384 timeout.exe 576 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1776 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2600 vssvc.exe Token: SeRestorePrivilege 2600 vssvc.exe Token: SeAuditPrivilege 2600 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 decryptor.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1776 1712 test.exe 36 PID 1712 wrote to memory of 1776 1712 test.exe 36 PID 1712 wrote to memory of 1776 1712 test.exe 36 PID 1712 wrote to memory of 1776 1712 test.exe 36 PID 1712 wrote to memory of 2768 1712 test.exe 39 PID 1712 wrote to memory of 2768 1712 test.exe 39 PID 1712 wrote to memory of 2768 1712 test.exe 39 PID 1712 wrote to memory of 2768 1712 test.exe 39 PID 1712 wrote to memory of 1004 1712 test.exe 40 PID 1712 wrote to memory of 1004 1712 test.exe 40 PID 1712 wrote to memory of 1004 1712 test.exe 40 PID 1712 wrote to memory of 1004 1712 test.exe 40 PID 1004 wrote to memory of 576 1004 cmd.exe 43 PID 1004 wrote to memory of 576 1004 cmd.exe 43 PID 1004 wrote to memory of 576 1004 cmd.exe 43 PID 1004 wrote to memory of 576 1004 cmd.exe 43 PID 1004 wrote to memory of 1384 1004 cmd.exe 44 PID 1004 wrote to memory of 1384 1004 cmd.exe 44 PID 1004 wrote to memory of 1384 1004 cmd.exe 44 PID 1004 wrote to memory of 1384 1004 cmd.exe 44 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\test.zip1⤵PID:2064
-
C:\Users\Admin\Desktop\test.exe"C:\Users\Admin\Desktop\test.exe"1⤵
- Matrix Ransomware
- Loads dropped DLL
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\vssadmin.exe"vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1776
-
-
C:\Users\Admin\Desktop\decryptor.exe"C:\Users\Admin\Desktop\decryptor.exe" C:\Users\Admin\Desktop//test.exe2⤵
- Matrix Ransomware
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2768
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\//destruct.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:576
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1384
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59fc8c1a6a41735fc179f5c68c873094e
SHA172fa99ada01df642fc4be3be5919f5fde13e237d
SHA2561729afa415cae96f5519487be1b66f85ae754ce421f8aa5395489fd8c71bd09c
SHA512a736bce10e24e19688464ac3c802938a76e0ac332faa5577d5b81673bf2bb1c28acf5a43ac6b907ff3676bb03323cb7af7b102530add1d9303b0de33cacb2c62
-
Filesize
74B
MD50cff879b1fb5d30b2d19fb28f3509022
SHA1f2908f85d71e5b6e891325a90577856bff3cafa5
SHA256b13b8b4bd3ea908828841e928358569eab51c0c98267f56a4ee59a791138b15d
SHA5125db4cb41d255267cbe53b792c281ddd1526fbecd07ae8d7bd0458d442b1960fffc4c40451c759ae0cfe85702e6b4c12ad16995e0c0ba3c4350885e53bc6a5b2a
-
Filesize
74B
MD50cff879b1fb5d30b2d19fb28f3509022
SHA1f2908f85d71e5b6e891325a90577856bff3cafa5
SHA256b13b8b4bd3ea908828841e928358569eab51c0c98267f56a4ee59a791138b15d
SHA5125db4cb41d255267cbe53b792c281ddd1526fbecd07ae8d7bd0458d442b1960fffc4c40451c759ae0cfe85702e6b4c12ad16995e0c0ba3c4350885e53bc6a5b2a
-
Filesize
1.8MB
MD5c15bc99ff3302bc5b7df5cdf9e35867a
SHA1eeccd6df77b0d54edb2525e5509dca3d0997cd81
SHA256abb3204ada8a8f754027bff135f8c7d0959266cba3d361540ab4c1cf5155699e
SHA512811cb07d49a1a696ba8ae42196d3d2888c09fb33f0e96840fb91595391edafc468871bda9328f25227659a22021fc744cec33b5b0b8f754e3ab8175b4f55f498
-
Filesize
1.1MB
MD529e36ffed6a74fb0ea47557add869791
SHA1e6bd838895c243f40d7f7e01b3129eb98defea58
SHA256302e6812043ccebadfc3b17585ebd5139ac03ef44d1cbf23cf7d7749e4b3b526
SHA512e6c024234fae580738ad96e33cc1bb53b9c5e0d75114f1a6725c778f17b1f0d2b2279b6ba0ed2365d47af68337db895a4672d3d4cc4d506cb55e7cbfe9aa995f
-
Filesize
1.2MB
MD5a1d74e4c3e0e9c4e321a5c31f781cb9f
SHA1aa2a99bf3fa5500db700a3cabe4826ef382d3d9b
SHA2568e86e286051d7bed6b52e551b715e851283f6407a67759fb5261c6df761fcd2c
SHA51270d9a8021797ca96ed3d06c9c500d7ee2a56f251d067aa4c4db123f814819adee0b6aa1ec244ec9d5170d5d93236166daeb87d3fe1c47c5e691d06b9a4855367
-
Filesize
992KB
MD54d5e70f6eff4bf66918c7064957f5dcb
SHA1250cb054173c2b3a9dfcede576223e23370d4843
SHA256dd7cae139857619a47cd5521114d387e0bdf43bd53c360c1bb8e9e71dad85be2
SHA5124ba88e8751925386421db6ff7992008966d7d38b988cae3b85427ea5630e04a21c3ca4b96c16cd21a6262034d45d95a3ed0d1efd96462c91dd2600384594116b
-
Filesize
551KB
MD5cf3e9995c794c68b0feb14d7c87a21d1
SHA17c26d05d73e773e533eb732b217fb75a4f94bf87
SHA256a3cfcc4acbecd571c1465e409c757c8ab67ccd706c8746baeb10c14eb0269511
SHA512c5f39f05fe1e1ca63332fc79c3b12a2dfafc257019fe09c7420cf94494901c0a33f09a9732baf427f035bb9362e7e308583560d93bfcdc157572d113e1104ff5
-
Filesize
1.3MB
MD5c2bf2e59eb704d682c19e0113ea623be
SHA1a8c1628487d381f2377c09fb756b20d959870363
SHA256e6ff6f30016fa4937cbe292cd6ecb141845813734bc0f41bd45f751bec4a0909
SHA512c2373025f9b2dadac0dc6abe0292d08ba666e4b012c6c906df2ee91d24c1030546eb12fe298ef029da1b15f00c24e51dff081b6fb2fd3f17a605ebccb59026e9
-
Filesize
904KB
MD5ec65585c32a2f16523a90e5d149f48fb
SHA158008e7331d4df572a28081b0b97263ba241c5d3
SHA256a970552065d385ef670dd1fc8c9db7c44150c2efdf521e7062637d0109aa0e87
SHA512db119bd6c247fb6dc370eacd1784b8fea1c5f5a48554dc3fa30725ff83b37033154aaa9b882a168b1736cbca6d9e53abb63393ee7620239930d8f4139ba8d410
-
Filesize
26KB
MD50b2326b571dec3bfe1c58338bd50e766
SHA15939e2a436e2afb971e56c6083289a7840be2d05
SHA25624a324dbf20536f81b2ff7868a9aeaa10cb0b2ddfb9619e22de0303cad69012b
SHA51278cac3555bc43a8ee8ff0851fe132876f2a398d6f9006b4338d50c6aaf758067fff344e2ca0436c978d5e85f7923d7a9696d2311b99abba2d67a24d30e29aa7b
-
Filesize
26KB
MD50b2326b571dec3bfe1c58338bd50e766
SHA15939e2a436e2afb971e56c6083289a7840be2d05
SHA25624a324dbf20536f81b2ff7868a9aeaa10cb0b2ddfb9619e22de0303cad69012b
SHA51278cac3555bc43a8ee8ff0851fe132876f2a398d6f9006b4338d50c6aaf758067fff344e2ca0436c978d5e85f7923d7a9696d2311b99abba2d67a24d30e29aa7b
-
Filesize
26KB
MD50b2326b571dec3bfe1c58338bd50e766
SHA15939e2a436e2afb971e56c6083289a7840be2d05
SHA25624a324dbf20536f81b2ff7868a9aeaa10cb0b2ddfb9619e22de0303cad69012b
SHA51278cac3555bc43a8ee8ff0851fe132876f2a398d6f9006b4338d50c6aaf758067fff344e2ca0436c978d5e85f7923d7a9696d2311b99abba2d67a24d30e29aa7b