Overview
overview
10Static
static
1007117c02a0...99.dll
windows7-x64
107117c02a0...99.dll
windows10-2004-x64
11391c20a26...80.dll
windows7-x64
101391c20a26...80.dll
windows10-2004-x64
10350ba7fca6...bd.exe
windows7-x64
9350ba7fca6...bd.exe
windows10-2004-x64
1051eb749d6c...3e.dll
windows7-x64
351eb749d6c...3e.dll
windows10-2004-x64
1017205c4318...90.exe
windows7-x64
917205c4318...90.exe
windows10-2004-x64
95d2204f3a2...aa.exe
windows7-x64
5d2204f3a2...aa.exe
windows10-2004-x64
7883f01096...8a.exe
windows7-x64
107883f01096...8a.exe
windows10-2004-x64
10ae7c868713...6e.exe
windows7-x64
10ae7c868713...6e.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 12:59
Behavioral task
behavioral1
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral13
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10v2004-20240226-en
General
-
Target
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
-
Size
737KB
-
MD5
0bf7bc20496143a9f028e77ab47b4698
-
SHA1
aa54013aeb502b4a936331deb76a6411f1f1ade7
-
SHA256
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd
-
SHA512
5e94cd77c4ad6dfa1064915ca0f4d117a2e3a4e924d05a16df0b223a5a0cbcb6124627e41d184aa0584f3ff3bbd5f9f913964887c7eb140e105317d4f5709981
-
SSDEEP
12288:bO+sm75a7DI9Mv53VI/XfaUs442JbV24chSS1i2wZbDFMMWzVFq:rh75a7M9S3VYa4npY4cFM2MWhY
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1312 2236 WerFault.exe 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2548 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.taovhsr3u\DefaultIcon 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.taovhsr3u 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.taovhsr3u\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2940 vssvc.exe Token: SeRestorePrivilege 2940 vssvc.exe Token: SeAuditPrivilege 2940 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.execmd.exedescription pid process target process PID 2236 wrote to memory of 1692 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe cmd.exe PID 2236 wrote to memory of 1692 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe cmd.exe PID 2236 wrote to memory of 1692 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe cmd.exe PID 2236 wrote to memory of 1692 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe cmd.exe PID 1692 wrote to memory of 2548 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 2548 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 2548 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 2548 1692 cmd.exe vssadmin.exe PID 2236 wrote to memory of 1312 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe WerFault.exe PID 2236 wrote to memory of 1312 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe WerFault.exe PID 2236 wrote to memory of 1312 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe WerFault.exe PID 2236 wrote to memory of 1312 2236 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe WerFault.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe"C:\Users\Admin\AppData\Local\Temp\350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 3242⤵
- Program crash
PID:1312
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2940