Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 12:04
Behavioral task
behavioral1
Sample
d01048c32a640bba23ed9dfdadd255f225fa5c68ad690e00221500949333ae97.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d01048c32a640bba23ed9dfdadd255f225fa5c68ad690e00221500949333ae97.dll
Resource
win10v2004-20240226-en
General
-
Target
d01048c32a640bba23ed9dfdadd255f225fa5c68ad690e00221500949333ae97.dll
-
Size
981KB
-
MD5
6a72fe78139b79885be94f4bad7edbb8
-
SHA1
77948ecf0a7114b44d57d51bcea8ecc63263f632
-
SHA256
d01048c32a640bba23ed9dfdadd255f225fa5c68ad690e00221500949333ae97
-
SHA512
43e33153ccfcc76815ddecc43c19714d957aac1dedbd192748f25d86bf096a556a3f4a589e0b7f8f3fa3ee34ab6d75cac49539839ec195396f5d0de84b2b357d
-
SSDEEP
6144:getwmCnyadCadladGadkad6gadlJad0adZjHad/:rtqyacaHaMa+aEgaXJaqaLjHaR
Malware Config
Extracted
C:\Recovery\WindowsRE\RecoveryManual.html
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Drops desktop.ini file(s) 25 IoCs
description ioc Process File opened for modification \??\c:\Users\Public\Pictures\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\3D Objects\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\OneDrive\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Pictures\Saved Pictures\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Pictures\Camera Roll\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\AccountPictures\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini regsvr32.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini regsvr32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: regsvr32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\Program Files\RecoveryManual.html regsvr32.exe File created \??\c:\Program Files (x86)\RecoveryManual.html regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.61D0A30C\shell\Open\command regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.61D0A30C regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.61D0A30C\shell regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.61D0A30C\shell\Open regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.61D0A30C\shell\Open\command\ = "explorer.exe RecoveryManual.html" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 regsvr32.exe 2768 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeRestorePrivilege 2768 regsvr32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 4696 2768 regsvr32.exe 91 PID 2768 wrote to memory of 4696 2768 regsvr32.exe 91 PID 4696 wrote to memory of 2984 4696 cmd.exe 93 PID 4696 wrote to memory of 2984 4696 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2984 attrib.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d01048c32a640bba23ed9dfdadd255f225fa5c68ad690e00221500949333ae97.dll1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E574016.bat" "C:\Users\Admin\AppData\Local\Temp\d01048c32a640bba23ed9dfdadd255f225fa5c68ad690e00221500949333ae97.dll""2⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\d01048c32a640bba23ed9dfdadd255f225fa5c68ad690e00221500949333ae97.dll"3⤵
- Views/modifies file attributes
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f59a532319772a791cbcb0e46334d943
SHA1d86fd73091f3de9647c322bc231a8fcebffe692c
SHA256081771e003a65fe09e6875127b3a19d962205174bbb603c811299cdb76cc7426
SHA5126393dca2e4eee984a67596835f5c03c230a2575a0cf0a4f918e56d7fa8eabc34dc5240aef37f6ead028c4503a5f48e69f810a9e217e5b7962b783d1371c4512c
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611