Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe
Resource
win10v2004-20231020-en
General
-
Target
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe
-
Size
326KB
-
MD5
c40c5bcb6c4cceadca53b2ca29a7fe0b
-
SHA1
f7aa8ebc0c7a745e3c75082c031780dfbab6e4a9
-
SHA256
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e
-
SHA512
5b5a217bc49493fde14e9d6a866244c76d73a9a0de2d0f01f46d2d6bdcec011906f63a24f9caedd16a8ac54c21a40be8d020acbfd9726ff7e8a4066f43c1a680
-
SSDEEP
6144:4Ozb+3+UEoTkUdiJxemmh/9p2Aj+wDPc0gQUCrkftmfdOjwzxH4T:9+EoTkUdmxSh/9p2W00FUCrkFm5zxH4
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\e066bf9664 = "C:\\Users\\Admin\\AppData\\Roaming\\e066bf9664\\18a26d0d5c.exe" explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 544 vssadmin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2564 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 2448 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2800 vssvc.exe Token: SeRestorePrivilege 2800 vssvc.exe Token: SeAuditPrivilege 2800 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2564 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2448 2564 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 28 PID 2564 wrote to memory of 2448 2564 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 28 PID 2564 wrote to memory of 2448 2564 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 28 PID 2564 wrote to memory of 2448 2564 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 28 PID 2448 wrote to memory of 2816 2448 explorer.exe 29 PID 2448 wrote to memory of 2816 2448 explorer.exe 29 PID 2448 wrote to memory of 2816 2448 explorer.exe 29 PID 2448 wrote to memory of 2816 2448 explorer.exe 29 PID 2448 wrote to memory of 544 2448 explorer.exe 37 PID 2448 wrote to memory of 544 2448 explorer.exe 37 PID 2448 wrote to memory of 544 2448 explorer.exe 37 PID 2448 wrote to memory of 544 2448 explorer.exe 37 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe"C:\Users\Admin\AppData\Local\Temp\9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\syswow64\svchost.exe-k netsvcs3⤵PID:2816
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:544
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf