Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 13:46

General

  • Target

    fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7.exe

  • Size

    121KB

  • MD5

    eac0a08470ee67c63b14ae2ce7f6aa61

  • SHA1

    285c0163376d5d9a5806364411652fe73424d571

  • SHA256

    fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7

  • SHA512

    f3fd7eeae18843d049443f0d5e818302eb3b3f73ad85e26c01e1ddc0a102a0a22b065afe01879aafc95ff3a2d15b5c302394bd03d91e6c4401648cd4222bddc5

  • SSDEEP

    1536:3THoX8wNjiMsyPcjgbKx534oU6Llg/iLBkZhifkdol9LYuVF5yZbn:DjksYKx5o3Slg/itMg8+LYu9ubn

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops desktop.ini file(s) 26 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7.exe
    "C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7.exe
      "C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • NTFS ADS
      • Suspicious use of WriteProcessMemory
      PID:356
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C sc stop VVS
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Windows\SysWOW64\sc.exe
          sc stop VVS
          4⤵
          • Launches sc.exe
          PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C sc stop wscsvc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\sc.exe
          sc stop wscsvc
          4⤵
          • Launches sc.exe
          PID:2632
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C sc stop WinDefend
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Windows\SysWOW64\sc.exe
          sc stop WinDefend
          4⤵
          • Launches sc.exe
          PID:2848
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C sc stop wuauserv
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\sc.exe
          sc stop wuauserv
          4⤵
          • Launches sc.exe
          PID:2728
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C sc stop BITS
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Windows\SysWOW64\sc.exe
          sc stop BITS
          4⤵
          • Launches sc.exe
          PID:2708
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C sc stop ERSvc
        3⤵
          PID:2724
          • C:\Windows\SysWOW64\sc.exe
            sc stop ERSvc
            4⤵
            • Launches sc.exe
            PID:2496
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C sc stop WerSvc
          3⤵
            PID:2472
            • C:\Windows\SysWOW64\sc.exe
              sc stop WerSvc
              4⤵
              • Launches sc.exe
              PID:2464
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All /Quiet
            3⤵
              PID:2616
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin.exe Delete Shadows /All /Quiet
                4⤵
                • Interacts with shadow copies
                PID:1916
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled No
              3⤵
                PID:2448
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                3⤵
                  PID:2512
                • C:\Users\Admin\AppData\Roaming\BC1C9B74EA.exe
                  C:\Users\Admin\AppData\Roaming\BC1C9B74EA.exe
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:1828
                  • C:\Users\Admin\AppData\Roaming\BC1C9B74EA.exe
                    C:\Users\Admin\AppData\Roaming\BC1C9B74EA.exe
                    4⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Drops desktop.ini file(s)
                    • Drops file in Program Files directory
                    • Drops file in Windows directory
                    PID:2076
                    • C:\Windows\SysWOW64\NOTEPAD.EXE
                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_HELP_INSTRUCTION.TXT
                      5⤵
                      • Opens file in notepad (likely ransom note)
                      PID:2616
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2768

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\MSOCache\All Users\_HELP_INSTRUCTION.TXT

                    Filesize

                    1KB

                    MD5

                    15def8569a7210afa2925a3312f7b055

                    SHA1

                    0467fd0b80d3ce603ddf3b022bf22bb0bcae3f3d

                    SHA256

                    469bd39c370118c8f1b216f7bd540c3615d27ec2d44a9ae5491ac6edd299aeb9

                    SHA512

                    97008cadd498580e9d16cf2f5270e5372e017ea8c615c57f0369141983316b7c0214d5e982ed74829e249cb9fabd77fc4e0b724592d384783f553512be0f3083

                  • \Users\Admin\AppData\Roaming\BC1C9B74EA.exe

                    Filesize

                    121KB

                    MD5

                    eac0a08470ee67c63b14ae2ce7f6aa61

                    SHA1

                    285c0163376d5d9a5806364411652fe73424d571

                    SHA256

                    fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7

                    SHA512

                    f3fd7eeae18843d049443f0d5e818302eb3b3f73ad85e26c01e1ddc0a102a0a22b065afe01879aafc95ff3a2d15b5c302394bd03d91e6c4401648cd4222bddc5

                  • memory/356-4-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/356-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/356-6-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/1828-23-0x0000000000530000-0x0000000000630000-memory.dmp

                    Filesize

                    1024KB

                  • memory/1828-544-0x0000000000530000-0x0000000000630000-memory.dmp

                    Filesize

                    1024KB

                  • memory/2076-80-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-100-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-32-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-40-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-45-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-50-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-55-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-60-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-65-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-70-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-75-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-623-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-85-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-90-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-95-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-31-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-105-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-29-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-121-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-127-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-134-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-140-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-145-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-147-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-149-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-151-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-153-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-155-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2076-26-0x0000000000400000-0x000000000040F000-memory.dmp

                    Filesize

                    60KB

                  • memory/2384-2-0x00000000004B0000-0x00000000005B0000-memory.dmp

                    Filesize

                    1024KB