Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 13:44

General

  • Target

    https://samples.vx-underground.org/Samples/Families/RoyalRansomware/5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z

Score
10/10

Malware Config

Signatures

  • Royal

    Royal is a ransomware first seen in 2022.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Royal Ransomware 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://samples.vx-underground.org/Samples/Families/RoyalRansomware/5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabd4146f8,0x7ffabd414708,0x7ffabd414718
      2⤵
        PID:3780
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:2428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1216
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8
          2⤵
            PID:3108
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:216
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              2⤵
                PID:2996
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:8
                2⤵
                  PID:780
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:744
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:1
                  2⤵
                    PID:4772
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1
                    2⤵
                      PID:2128
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                      2⤵
                        PID:3200
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:1
                        2⤵
                          PID:4960
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5316 /prefetch:8
                          2⤵
                            PID:3024
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:1
                            2⤵
                              PID:1268
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,17534263074779681204,17464210147694118319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1680
                            • C:\Program Files\7-Zip\7zFM.exe
                              "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z"
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              PID:5504
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1864
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:696
                              • C:\Users\Admin\Desktop\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.exe
                                "C:\Users\Admin\Desktop\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:3344
                                • C:\Windows\System32\vssadmin.exe
                                  delete shadows /all /quiet
                                  2⤵
                                  • Interacts with shadow copies
                                  PID:1824
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4940
                              • C:\Program Files\7-Zip\7zG.exe
                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\InvokeUpdate\" -ad -an -ai#7zMap13675:82:7zEvent30223
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:5760

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                f35bb0615bb9816f562b83304e456294

                                SHA1

                                1049e2bd3e1bbb4cea572467d7c4a96648659cb4

                                SHA256

                                05e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71

                                SHA512

                                db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                1eb86108cb8f5a956fdf48efbd5d06fe

                                SHA1

                                7b2b299f753798e4891df2d9cbf30f94b39ef924

                                SHA256

                                1b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40

                                SHA512

                                e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                194B

                                MD5

                                c753a51b344f5e0b7614e6b335efce1a

                                SHA1

                                ecab6c44f7f65a04b594d3c1f5ccc151e1fbbea5

                                SHA256

                                b9be628c5d1925240917e40326ded59765a86dfc8580b59d2e51f9925f3fc494

                                SHA512

                                c579bb93537ef2b84bf17b99354eaf60da7719432451d916f15084675ab7fa9c5b24c8e370108b0fec1244d2a8ff44e1ace16fca9abf18c5a12f91f8801a68c5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                9f160db558a41278d8dca940f435534d

                                SHA1

                                4c151d29be208b6920d22b1682a7196388ba1cf7

                                SHA256

                                12a7851e3f1e879df8b23ee4c1d56b4928a33991cab951abf69a3fcd1bfba986

                                SHA512

                                24cfde3597f3077939d99fc331c9ba5c61454a5714ef0ad1c8f55ffcbe846406bfa6055266cfc0f0e114f4b921de5dbbbce317f1259c8e3bedc8620b8b4160c3

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                aa322ac651ff02d6ca05b412a44d9961

                                SHA1

                                7972c7a69d0fe23194779468e83d3335ad8fc2e6

                                SHA256

                                bd5052d021e1a9ac275050ae52185ea99dcbe99a7ea2c1a8a6bbf2a45e5f2bfe

                                SHA512

                                448b770ff0d28f9d84719cc3e26b8e6ed7e5edc90b81c150c9c0f0612d4c1b5719fc59cd785eb3737f350f858e0620b750e20ff47d9fc02f4c063ea5604ea6d5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                e01c32c8728412e98a5d5e143fa926b5

                                SHA1

                                97aa5734a2749db939e5f299dc664017626ea9c0

                                SHA256

                                a2abc96506de1f6f0d0318bb69cbc383c8d3f230d6ed46ea3d7840a70b921817

                                SHA512

                                a265a28df321f32be49c9f7c8077c4349bdafb444aafb5d4895d486e4e27fb69d39986c1842525f5d0958c0e038f9620c2a1c91548ecc178c41141698c46d9b6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                caaa5afdc4dc4aa0c6b3aacb1b5285f9

                                SHA1

                                56198d841770016048c7b97ea47f9affd8cbd9b6

                                SHA256

                                925b3bffb225e2c693dfe7c0e57b23ed8723dcb14eb96307ab0e47ab7172c31d

                                SHA512

                                dd99d108190371ecfcd84bf8303a0077faa7271564bfff4caf8be5f5851a46427b447f2b960cd4187d6faa2489e7e8fa04880a038b3cc211878f763b7e24e1de

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                45d6008669e79ac6403eef6fe0c22d73

                                SHA1

                                a408776037a348d5697f0cb0800659f0a58c3ed5

                                SHA256

                                01be53c0e8c43fba68c6b525e8f98f6d315743a52071954ea7955598ca05ef47

                                SHA512

                                e5dbf13cc41c88383bec737348f70b2322a536d00637808a607c26b6236df1337f9409ea96f2844874d80181f98007b706bd417d845252d4e6328055bce61ce5

                              • C:\Users\Admin\Desktop\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.exe

                                Filesize

                                2.9MB

                                MD5

                                937d8f5da4adff6309bfa4c3b63a2708

                                SHA1

                                f697230ba32c437760bf2ac36e6bb33b86684244

                                SHA256

                                5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2

                                SHA512

                                cf14e62fe08f8e3f240f773e91c585805f09a385faabcc040622e02b39501aca9e595d8eda88958430c094429d86446230614f942272c977e450a745e4b04fe1

                              • C:\Users\Admin\Downloads\5fda381a9884f7be2d57b8a290f389578a9d2f63e2ecb98bd773248a7eb99fa2.7z

                                Filesize

                                1.1MB

                                MD5

                                24a1bc63a8c676077cf5ea00d78bfe68

                                SHA1

                                a524a3a0952799950045eeaf46ea7c82fde47e8b

                                SHA256

                                22226007923076d7c685d9d7b071f40363f2b4dd203faaa07dbedd77fb9deab3

                                SHA512

                                14f0a656e9547132d2f7b9c54bb30a9f8e179c022f461cee9c47d29210577482062893c517b6a408cb1740b6216f70fbe7a9bd153f8eb62d28fd831a7b091080