Malware Analysis Report

2024-09-11 01:41

Sample ID 240115-mln9sseben
Target e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527.zip
SHA256 fca69729e8052caad11c59e1ec5b7671bb1898724b3a1316ad77c8e565c85795
Tags
agenda ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fca69729e8052caad11c59e1ec5b7671bb1898724b3a1316ad77c8e565c85795

Threat Level: Known bad

The file e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527.zip was found to be: Known bad.

Malicious Activity Summary

agenda ransomware

Agenda family

Agenda Ransomware

Deletes shadow copies

Renames multiple (152) files with added filename extension

Drops file in Windows directory

Unsigned PE

Interacts with shadow copies

Suspicious use of AdjustPrivilegeToken

Uses Volume Shadow Copy service COM API

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-01-15 10:33

Signatures

Agenda family

agenda

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-15 10:33

Reported

2024-01-15 10:37

Platform

win10-20231215-en

Max time kernel

89s

Max time network

166s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527.exe"

Signatures

Agenda Ransomware

ransomware agenda

Deletes shadow copies

ransomware

Renames multiple (152) files with added filename extension

ransomware

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Debug\ESE.TXT C:\Windows\system32\svchost.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527.exe

"C:\Users\Admin\AppData\Local\Temp\e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527.exe"

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Users\Admin\AppData\Local\Temp\e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527.exe

e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527.exe --password AgendaPass

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc

C:\Windows\system32\cmd.exe

"cmd" /C "vssadmin.exe delete shadows /all /quiet"

C:\Windows\system32\vssadmin.exe

vssadmin.exe delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 57.110.18.2.in-addr.arpa udp
US 8.8.8.8:53 209.80.50.20.in-addr.arpa udp
US 8.8.8.8:53 208.178.17.96.in-addr.arpa udp

Files

memory/4684-0-0x00000000002B0000-0x0000000000448000-memory.dmp

memory/3932-1-0x000002646FE90000-0x000002646FEA0000-memory.dmp

memory/3932-5-0x00000264702D0000-0x00000264702E0000-memory.dmp

memory/3932-9-0x0000026474980000-0x0000026474981000-memory.dmp

memory/4252-11-0x00000000002B0000-0x0000000000448000-memory.dmp

C:\Users\README-RECOVER-MmXReVIxLV.txt

MD5 0b080299bd4389f496cb40d4f87be3bf
SHA1 a11d1769af2a91c04e4bead82e8a64e785980015
SHA256 16cbd60f0e147c4998e3c3d140af23365e77c3403737be0157b878753bf4f999
SHA512 a0b43797e67fdc7035e4041b32ed15ef5a8e0fba5845a4f0b43d998cd7615e74f2bef49e31903b3ea8f484e7693064a389e0aeaba4ffb35044417caaacdfdc1c

memory/4252-344-0x00000000002B0000-0x0000000000448000-memory.dmp