Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 17:07
Behavioral task
behavioral1
Sample
1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe
Resource
win10v2004-20231215-en
General
-
Target
1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe
-
Size
42KB
-
MD5
ce36475e41157b1187801d6b663ab744
-
SHA1
70a4c1e77ab8c2de2cdf928dabd7fedfbd7a41c4
-
SHA256
1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808
-
SHA512
1526d76a12e6cb98630d711752281068daa9188d7aaccaf3049d28fc4b18a24eb6a81c161d616273b7e4deefa24f5481b8e4ff58a6c8491737763fc9e21bb521
-
SSDEEP
768:PO1oR/rVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzD04rOcWNJLoYg:P5S1FKnDtkuImKNJ8
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (2999) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2568 wbadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tl.gif.[A7FC51EA].[[email protected]].mkp 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsNotesBackground_PAL.wmv 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Palmer 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref_PAL.wmv 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Journal\de-DE\jnwmon.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\settings.js 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\gadget.xml 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\gadget.xml 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd.otf.[A7FC51EA].[[email protected]].mkp 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\InkObj.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_precomp_matte.wmv 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Managua 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmpnssui.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SaveAsRTF.api 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\boot_zh_CN.jar 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-api-visual.xml 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-views.xml 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\MSPVWCTL.DLL.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\highDpiImageSwap.js 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\end_review.gif.[A7FC51EA].[[email protected]].mkp 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Chatham 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\+README-WARNING+.txt 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Journal\de-DE\JNTFiltr.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+8 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\adobepdf.xdc.[A7FC51EA].[[email protected]].mkp 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng.hyp 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Maputo 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-modules-options-api.xml 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\classlist 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\VideoLAN\VLC\AUTHORS.txt 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\+README-WARNING+.txt 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Curacao 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\vlc.mo 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\vlc.mo 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\settings.js 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\MANIFEST.MF 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-spi-quicksearch.jar 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Makassar 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Journal\it-IT\MSPVWCTL.DLL.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\+README-WARNING+.txt 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\updater_zh_CN.jar 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-actions.xml 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\vlc.mo 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Media Player\en-US\wmpnssci.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\15x15dot.png 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\cacerts 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Tahiti 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\+README-WARNING+.txt 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Common Files\System\ado\msado28.tlb 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Bucharest 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\DVD Maker\es-ES\WMM2CLIP.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\EST 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\flyout.css 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmpnscfg.exe.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\picturePuzzle.css 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\logging.properties 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1528 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2784 vssvc.exe Token: SeRestorePrivilege 2784 vssvc.exe Token: SeAuditPrivilege 2784 vssvc.exe Token: SeBackupPrivilege 2236 wbengine.exe Token: SeRestorePrivilege 2236 wbengine.exe Token: SeSecurityPrivilege 2236 wbengine.exe Token: SeIncreaseQuotaPrivilege 1172 WMIC.exe Token: SeSecurityPrivilege 1172 WMIC.exe Token: SeTakeOwnershipPrivilege 1172 WMIC.exe Token: SeLoadDriverPrivilege 1172 WMIC.exe Token: SeSystemProfilePrivilege 1172 WMIC.exe Token: SeSystemtimePrivilege 1172 WMIC.exe Token: SeProfSingleProcessPrivilege 1172 WMIC.exe Token: SeIncBasePriorityPrivilege 1172 WMIC.exe Token: SeCreatePagefilePrivilege 1172 WMIC.exe Token: SeBackupPrivilege 1172 WMIC.exe Token: SeRestorePrivilege 1172 WMIC.exe Token: SeShutdownPrivilege 1172 WMIC.exe Token: SeDebugPrivilege 1172 WMIC.exe Token: SeSystemEnvironmentPrivilege 1172 WMIC.exe Token: SeRemoteShutdownPrivilege 1172 WMIC.exe Token: SeUndockPrivilege 1172 WMIC.exe Token: SeManageVolumePrivilege 1172 WMIC.exe Token: 33 1172 WMIC.exe Token: 34 1172 WMIC.exe Token: 35 1172 WMIC.exe Token: SeIncreaseQuotaPrivilege 1172 WMIC.exe Token: SeSecurityPrivilege 1172 WMIC.exe Token: SeTakeOwnershipPrivilege 1172 WMIC.exe Token: SeLoadDriverPrivilege 1172 WMIC.exe Token: SeSystemProfilePrivilege 1172 WMIC.exe Token: SeSystemtimePrivilege 1172 WMIC.exe Token: SeProfSingleProcessPrivilege 1172 WMIC.exe Token: SeIncBasePriorityPrivilege 1172 WMIC.exe Token: SeCreatePagefilePrivilege 1172 WMIC.exe Token: SeBackupPrivilege 1172 WMIC.exe Token: SeRestorePrivilege 1172 WMIC.exe Token: SeShutdownPrivilege 1172 WMIC.exe Token: SeDebugPrivilege 1172 WMIC.exe Token: SeSystemEnvironmentPrivilege 1172 WMIC.exe Token: SeRemoteShutdownPrivilege 1172 WMIC.exe Token: SeUndockPrivilege 1172 WMIC.exe Token: SeManageVolumePrivilege 1172 WMIC.exe Token: 33 1172 WMIC.exe Token: 34 1172 WMIC.exe Token: 35 1172 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2840 2432 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe 29 PID 2432 wrote to memory of 2840 2432 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe 29 PID 2432 wrote to memory of 2840 2432 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe 29 PID 2432 wrote to memory of 2840 2432 1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe 29 PID 2840 wrote to memory of 1528 2840 cmd.exe 31 PID 2840 wrote to memory of 1528 2840 cmd.exe 31 PID 2840 wrote to memory of 1528 2840 cmd.exe 31 PID 2840 wrote to memory of 2568 2840 cmd.exe 34 PID 2840 wrote to memory of 2568 2840 cmd.exe 34 PID 2840 wrote to memory of 2568 2840 cmd.exe 34 PID 2840 wrote to memory of 1172 2840 cmd.exe 38 PID 2840 wrote to memory of 1172 2840 cmd.exe 38 PID 2840 wrote to memory of 1172 2840 cmd.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe"C:\Users\Admin\AppData\Local\Temp\1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe"C:\Users\Admin\AppData\Local\Temp\1ec36906942f364c760a7d1704faaa3dfcd7d52bcd1678e8c7a2c434ca785808.exe" n24322⤵PID:2836
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1528
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:2568
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2460
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:324
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
470B
MD5a4e7a9721a9ffef9f17e30de82036d5e
SHA14709a1182ebe118725e0170805ecc6a80df42667
SHA256f8e189b16d13ba97744dd0c924df9e23d3d1f2020d625ba294ef0fe5ac408aef
SHA512e960ec30ee81d04b6e4341c04ccc3d7aeeb1c48b4e43968cb6554788a25323b41a653678d0321a585ab5569e4eb28df098ac68e6b70b672080f1409516c23d66