Analysis
-
max time kernel
0s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe
Resource
win10v2004-20231215-en
General
-
Target
630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe
-
Size
225KB
-
MD5
3a087bb7ce04eef64a82958ee3507548
-
SHA1
ee0a57ac86e2d6e87e8a29109c984a44aab53296
-
SHA256
630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492ed
-
SHA512
4b314dd8b1992994b8194b6e729055feafb64f873b53289537a3d81f8a54929f5fc9a32bc134ffa3c44a71d7a7ded2f99af77459e3e186d7ccfadbba1747904e
-
SSDEEP
3072:n6syAG2L/wgMrxFSbY3Fq5dQWQC0F0+aLTZtjaPPZMtcdlrRMC/p2wc:6iG2EgwFSc3U5dv0FOTDaPPZME9Bc
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
conti
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exepid Process 3560 630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe 3560 630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
vssvc.exeWMIC.exedescription pid Process Token: SeBackupPrivilege 4464 vssvc.exe Token: SeRestorePrivilege 4464 vssvc.exe Token: SeAuditPrivilege 4464 vssvc.exe Token: SeIncreaseQuotaPrivilege 3100 WMIC.exe Token: SeSecurityPrivilege 3100 WMIC.exe Token: SeTakeOwnershipPrivilege 3100 WMIC.exe Token: SeLoadDriverPrivilege 3100 WMIC.exe Token: SeSystemProfilePrivilege 3100 WMIC.exe Token: SeSystemtimePrivilege 3100 WMIC.exe Token: SeProfSingleProcessPrivilege 3100 WMIC.exe Token: SeIncBasePriorityPrivilege 3100 WMIC.exe Token: SeCreatePagefilePrivilege 3100 WMIC.exe Token: SeBackupPrivilege 3100 WMIC.exe Token: SeRestorePrivilege 3100 WMIC.exe Token: SeShutdownPrivilege 3100 WMIC.exe Token: SeDebugPrivilege 3100 WMIC.exe Token: SeSystemEnvironmentPrivilege 3100 WMIC.exe Token: SeRemoteShutdownPrivilege 3100 WMIC.exe Token: SeUndockPrivilege 3100 WMIC.exe Token: SeManageVolumePrivilege 3100 WMIC.exe Token: 33 3100 WMIC.exe Token: 34 3100 WMIC.exe Token: 35 3100 WMIC.exe Token: 36 3100 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.execmd.exedescription pid Process procid_target PID 3560 wrote to memory of 2980 3560 630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe 25 PID 3560 wrote to memory of 2980 3560 630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe 25 PID 2980 wrote to memory of 3100 2980 cmd.exe 24 PID 2980 wrote to memory of 3100 2980 cmd.exe 24 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe"C:\Users\Admin\AppData\Local\Temp\630f0ff24aeeae0c8f04383f3e193ac541ff07d371c584d1d8b2aa1f1d6492edsample.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A09A1CCE-38ED-49CA-B405-791A9853F386}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2980
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A09A1CCE-38ED-49CA-B405-791A9853F386}'" delete1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3100
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
976B
MD5da0c9fcd74e70fc996d8a7b00f84b65c
SHA1095aba88a247ab670c9a566db276d8f7132a1921
SHA25686b7154f594c59245edd306ad0fd9a398b9f2966437a786a9a35b5d4f49f5b04
SHA512146c830f2fdc194b845202b710a03ac202e926cc58b57006d06441bacbb273ffaf2e5baf8811eb4745fd5e4296855abe75f5164782fc20f99775cfb16acbf4ea