Overview
overview
10Static
static
3samples4.zip
windows7-x64
1samples4.zip
windows10-2004-x64
10e60d49a96...01.exe
windows7-x64
0e60d49a96...01.exe
windows10-2004-x64
1ce5dd21fb...1e.exe
windows7-x64
101ce5dd21fb...1e.exe
windows10-2004-x64
103c73425d02...e6.exe
windows7-x64
63c73425d02...e6.exe
windows10-2004-x64
65df6314b5c...5b.exe
windows7-x64
105df6314b5c...5b.exe
windows10-2004-x64
105ee5166c02...93.exe
windows7-x64
105ee5166c02...93.exe
windows10-2004-x64
105f7cdd8c28...02.exe
windows7-x64
75f7cdd8c28...02.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
samples4.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
samples4.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win10v2004-20231215-en
General
-
Target
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
-
Size
2.2MB
-
MD5
71a4ba0fe0bc0cb450b8966cb585f757
-
SHA1
eccb76a942b3359d8dbf4c12e6bc3be0c8627eca
-
SHA256
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0
-
SHA512
5748e02e83ea32118013741680be6e2eea398b05cde8c359e0db9126175ce63a4890e7ca654e5a5930970889aa2598c650395972107d41522e55207dd5460c01
-
SSDEEP
12288:QnQY+2XG1Inz4vM/nlBKSduzxx73zDJnaPxMrFHQJGTTqTdd1o/CMj:QbGOnbzuHT5naPxUHQATTqzi/Cu
Malware Config
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 2736 xuwiumk.exe 800 xuwiumk.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-iyznxxc.bmp" Explorer.EXE -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-iyznxxc.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-iyznxxc.bmp svchost.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1524 vssadmin.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{bb077ec4-9b9f-11ee-97c7-806e6f6e6963}\MaxCapacity = "14116" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{69d89a81-9b61-11ee-a14d-ce9b5d0c5de4} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{69d89a81-9b61-11ee-a14d-ce9b5d0c5de4}\NukeOnDelete = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00620062003000370037006500630034002d0039006200390066002d0031003100650065002d0039003700630037002d003800300036006500360066003600650036003900360033007d00000030002c007b00360039006400380039006100380031002d0039006200360031002d0031003100650065002d0061003100340064002d006300650039006200350064003000630035006400650034007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{bb077ec4-9b9f-11ee-97c7-806e6f6e6963}\NukeOnDelete = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{69d89a81-9b61-11ee-a14d-ce9b5d0c5de4}\MaxCapacity = "2047" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{bb077ec4-9b9f-11ee-97c7-806e6f6e6963} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2676 5ee5166c02636f294fb8f6da69d5c0ae893.exe 2736 xuwiumk.exe 2736 xuwiumk.exe 2736 xuwiumk.exe 2736 xuwiumk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2736 xuwiumk.exe Token: SeDebugPrivilege 2736 xuwiumk.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2736 2868 taskeng.exe 31 PID 2868 wrote to memory of 2736 2868 taskeng.exe 31 PID 2868 wrote to memory of 2736 2868 taskeng.exe 31 PID 2868 wrote to memory of 2736 2868 taskeng.exe 31 PID 2736 wrote to memory of 608 2736 xuwiumk.exe 28 PID 608 wrote to memory of 2560 608 svchost.exe 33 PID 608 wrote to memory of 2560 608 svchost.exe 33 PID 608 wrote to memory of 2560 608 svchost.exe 33 PID 608 wrote to memory of 1336 608 svchost.exe 34 PID 608 wrote to memory of 1336 608 svchost.exe 34 PID 608 wrote to memory of 1336 608 svchost.exe 34 PID 2736 wrote to memory of 1204 2736 xuwiumk.exe 18 PID 2736 wrote to memory of 1524 2736 xuwiumk.exe 35 PID 2736 wrote to memory of 1524 2736 xuwiumk.exe 35 PID 2736 wrote to memory of 1524 2736 xuwiumk.exe 35 PID 2736 wrote to memory of 1524 2736 xuwiumk.exe 35 PID 2736 wrote to memory of 800 2736 xuwiumk.exe 36 PID 2736 wrote to memory of 800 2736 xuwiumk.exe 36 PID 2736 wrote to memory of 800 2736 xuwiumk.exe 36 PID 2736 wrote to memory of 800 2736 xuwiumk.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of UnmapMainImage
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0\5ee5166c02636f294fb8f6da69d5c0ae893.exe"C:\Users\Admin\AppData\Local\Temp\5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0\5ee5166c02636f294fb8f6da69d5c0ae893.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵PID:2560
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1336
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {DA96CEF5-8231-4C57-8C72-6C078EC0B9FE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\xuwiumk.exeC:\Users\Admin\AppData\Local\Temp\xuwiumk.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all3⤵
- Interacts with shadow copies
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\xuwiumk.exe"C:\Users\Admin\AppData\Local\Temp\xuwiumk.exe" -u3⤵
- Executes dropped EXE
PID:800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD5b835d5d36dd5ad8e66e2b809a5dd3839
SHA1d20d121c209dcf0d12cbf5da16de80e7159838f9
SHA256bc0d58f65ea394bd70903960dfa8613acad4901e35f8a10cab5df6789b6672e9
SHA5124037988e0c4e4ea0d283230229eb88076f7f4f163ce8f4e95b60d5b24fb93ac6d41c841e822b95097a42f202cefef6bbc4ef3bce4a12526625a794dbeca3a733
-
Filesize
654B
MD5d4c3ab1feac13d04b2a2a73602f40aed
SHA1beee1ca749cd62616172d5b14695f1aa40060a16
SHA256c85cba278eb93b9c0c6f19636f23bcfe39577ba16da703fe1d012b19ce3edcbb
SHA512d96b70818421be7ea1689dbff06fcdf62eb160c32cf63e83a098255b72ca239419a9bd8b4b0be9506ac7a4061df89949c5006c672f47a3d52c23c4b48414a081
-
Filesize
1.1MB
MD5b825019cda619718ed5c704327d8832d
SHA1305ca2cd4dac0c560ee4bec107a8a3fdfaa4ec95
SHA256f210148ae3309d2a6adb8442c730dc44ce2cf89db3cd0b467a0322a97c6853b8
SHA512d993ee286274b1f5df35677dbe85dbe2629a6f8d569bbfb4df05282b8aeb250ca7b1eba6bc10bbfc94742d2d1b930a1126e30636314aa1f472a427d0f5b836e5
-
Filesize
844KB
MD5c7a4045f61227cbc8d16e4fe8a07ff63
SHA1a4bc953936cda6de6958fa91ad5f44e3e9bff5bd
SHA256a127ad26fed4453f4150f8d527a82e698be2eac4820953df54565cd1ecfbe6d9
SHA5129fbb74410dd200cd6b6ebfcc99c89d6a58d64a2c880b33bcdb9df58f0ae487022433ab057c04e77ac9966997f8d07a7b7e5c2b1d15f163d085e3bd76b52813b3
-
Filesize
462KB
MD571552eb371b63cb3c482dba415cbd032
SHA1228ec45275065ebc0a0492a5fdc66cf626696af5
SHA2568abbc04966d9f4566c5f2a008181aa4013d42a53898b2637b79042f7419e6ff1
SHA51290c5920be8c566cc3c8fa7a71835318bce941d26e61bcae3b76f608afe1980435ab2e217359d8ba17b377bf3dcc68e7892d48d5f9977324764ea561a32aeea4d
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88