Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
since1969.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
since1969.exe
Resource
win10v2004-20230915-en
General
-
Target
since1969.exe
-
Size
210KB
-
MD5
48452dd2506831d0b340e45b08799623
-
SHA1
74993759f49d123ec334111f29cdbbf2e0276b58
-
SHA256
b7319f3e21c3941fc2a960b67a150b02f1f3389825164140e75dfa023a73d34c
-
SHA512
5a0b4f5884ae2d302661b0581ab2475c1403555af0f531e1d0c29e240454dfe9979a32979d30856c5ad5da0ea1ffac1ec2c16eb6fa07b7ece74e069fcf2e5958
-
SSDEEP
3072:LNWPHNek0igmpXlZwbvsBQUbtqJQW7xAZ22yz6VoSYMFZoJ8lsPGKLpZnoHq86fa:RGSigm1lmbaBp7O6qSYCiNPhzHa
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\!!ReadMe_To_Decrypt_My_Files.txt
ragnarok
Signatures
-
Ragnarok
Ransomware family deployed from Citrix servers infected via CVE-2019-19781.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2792 bcdedit.exe 2956 bcdedit.exe -
Renames multiple (608) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2308 netsh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File created C:\Users\Public\Documents\desktop.ini since1969.exe File created C:\Users\Public\Pictures\Sample Pictures\desktop.ini since1969.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini since1969.exe File created C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini since1969.exe File created C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\XOUCI7X0\desktop.ini since1969.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini since1969.exe File created C:\Users\Admin\Contacts\desktop.ini since1969.exe File created C:\Users\Admin\Videos\desktop.ini since1969.exe File created C:\Users\Public\Videos\Sample Videos\desktop.ini since1969.exe File created C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9ZA6L5EC\desktop.ini since1969.exe File created C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\S14V3QJ7\desktop.ini since1969.exe File created C:\Users\Public\Downloads\desktop.ini since1969.exe File created C:\Users\Public\Recorded TV\desktop.ini since1969.exe File created C:\Users\Admin\Desktop\desktop.ini since1969.exe File created C:\Users\Admin\Documents\desktop.ini since1969.exe File created C:\Users\Admin\Downloads\desktop.ini since1969.exe File created C:\Users\Admin\Favorites\desktop.ini since1969.exe File created C:\Users\Admin\Music\desktop.ini since1969.exe File created C:\Users\Admin\Pictures\desktop.ini since1969.exe File created C:\Users\Public\Music\desktop.ini since1969.exe File created C:\Users\Public\Videos\desktop.ini since1969.exe File created C:\Users\Public\Music\Sample Music\desktop.ini since1969.exe File created C:\Users\Public\Desktop\desktop.ini since1969.exe File created C:\Users\Public\Pictures\desktop.ini since1969.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini since1969.exe File created C:\Users\Admin\Favorites\Links\desktop.ini since1969.exe File created C:\Users\Admin\Favorites\Links for United States\desktop.ini since1969.exe File created C:\Users\Public\Recorded TV\Sample Media\desktop.ini since1969.exe File created C:\Users\Public\desktop.ini since1969.exe File created C:\Users\Admin\Links\desktop.ini since1969.exe File created C:\Users\Admin\Saved Games\desktop.ini since1969.exe File created C:\Users\Admin\Searches\desktop.ini since1969.exe File created C:\Users\Public\Libraries\desktop.ini since1969.exe File created C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\FZ6PR11S\desktop.ini since1969.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2376 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2936 since1969.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2640 vssvc.exe Token: SeRestorePrivilege 2640 vssvc.exe Token: SeAuditPrivilege 2640 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2996 2936 since1969.exe 28 PID 2936 wrote to memory of 2996 2936 since1969.exe 28 PID 2936 wrote to memory of 2996 2936 since1969.exe 28 PID 2936 wrote to memory of 2996 2936 since1969.exe 28 PID 2936 wrote to memory of 3012 2936 since1969.exe 31 PID 2936 wrote to memory of 3012 2936 since1969.exe 31 PID 2936 wrote to memory of 3012 2936 since1969.exe 31 PID 2936 wrote to memory of 3012 2936 since1969.exe 31 PID 2936 wrote to memory of 2172 2936 since1969.exe 30 PID 2936 wrote to memory of 2172 2936 since1969.exe 30 PID 2936 wrote to memory of 2172 2936 since1969.exe 30 PID 2936 wrote to memory of 2172 2936 since1969.exe 30 PID 2936 wrote to memory of 1240 2936 since1969.exe 29 PID 2936 wrote to memory of 1240 2936 since1969.exe 29 PID 2936 wrote to memory of 1240 2936 since1969.exe 29 PID 2936 wrote to memory of 1240 2936 since1969.exe 29 PID 2172 wrote to memory of 2792 2172 cmd.exe 36 PID 2172 wrote to memory of 2792 2172 cmd.exe 36 PID 2172 wrote to memory of 2792 2172 cmd.exe 36 PID 3012 wrote to memory of 2956 3012 cmd.exe 38 PID 3012 wrote to memory of 2956 3012 cmd.exe 38 PID 3012 wrote to memory of 2956 3012 cmd.exe 38 PID 2996 wrote to memory of 2376 2996 cmd.exe 37 PID 2996 wrote to memory of 2376 2996 cmd.exe 37 PID 2996 wrote to memory of 2376 2996 cmd.exe 37 PID 1240 wrote to memory of 2308 1240 cmd.exe 39 PID 1240 wrote to memory of 2308 1240 cmd.exe 39 PID 1240 wrote to memory of 2308 1240 cmd.exe 39 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\since1969.exe"C:\Users\Admin\AppData\Local\Temp\since1969.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\cmd.execmd.exe /c vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2376
-
-
-
C:\Windows\system32\cmd.execmd.exe /c netsh advfirewall set allprofiles state off2⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:2308
-
-
-
C:\Windows\system32\cmd.execmd.exe /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2792
-
-
-
C:\Windows\system32\cmd.execmd.exe /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2956
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5dc105fe798cf2b0e855d1e7577a0e425
SHA14acf28751dfbcec114cf3387215af6da0ce1dd7e
SHA2566bee385fef4b6c0c9cbcd8b3fc15b2825c7d0452ce378449002d0b38b3d95c6f
SHA512bc7d59da453432df3e84eaea65463ff22ad4404332db2d888cf0e15a1f781a50ddedf1b9e2ffba599e51af1597391bb5ed62849b32785e81ae0f7632393e9079