Resubmissions
18-04-2024 05:22
240418-f2z8nscc74 1018-04-2024 05:22
240418-f2njwade8w 1018-04-2024 05:21
240418-f2gfkade8s 718-04-2024 05:21
240418-f2csdacc53 1018-04-2024 05:21
240418-f2b6vade7x 7Analysis
-
max time kernel
591s -
max time network
503s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win11-20240412-en
General
-
Target
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
-
Size
371KB
-
MD5
bb8cd5df2be7e8bcc5be439675b3d0a2
-
SHA1
627ac60f64974d5caaf81c2de8ca0977c91f4219
-
SHA256
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a
-
SHA512
57031eb7d7b2c27d7ecacdc085d07065ced46a742128f9818f62c9fe6633c31aa8eb20ffc52c8415613787946060f5a6b5adf8b977d5ca4fed9656233ebd9cfa
-
SSDEEP
6144:tnzQnu/cmM1oSigOQT2F8U92Iu7DMVQZhWLvLRXdYX9ji+uhi2PsrhY:hzQnkM1oSiBGI8bxn5m6i+uo20tY
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{453ef255-e920-4f38-be1d-8e1a4370a94e}\_DECRYPT_INFO_tvrqve.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\Users\Admin\Favorites\_DECRYPT_INFO_tvrqve.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\_DECRYPT_INFO_tvrqve.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\Users\Admin\Desktop\backup_tvrqve\_DECRYPT_INFO_tvrqve.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Signatures
-
Maktub Locker
Advanced ransomware family capable of offline decryption, generally distributed via .scr email attachments.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (210) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/4472-215-0x0000000003990000-0x0000000003998000-memory.dmp acprotect behavioral2/memory/4472-219-0x0000000003990000-0x0000000003998000-memory.dmp acprotect behavioral2/memory/4472-220-0x0000000003990000-0x0000000003998000-memory.dmp acprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2304 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4728 WINWORD.EXE 4728 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4568 vssvc.exe Token: SeRestorePrivilege 4568 vssvc.exe Token: SeAuditPrivilege 4568 vssvc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4728 WINWORD.EXE 4728 WINWORD.EXE 4728 WINWORD.EXE 4728 WINWORD.EXE 4728 WINWORD.EXE 4728 WINWORD.EXE 4728 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4728 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 72 PID 4472 wrote to memory of 4728 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 72 PID 4472 wrote to memory of 2304 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 75 PID 4472 wrote to memory of 2304 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 75 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe"C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.rtf" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4728
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2304
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD573e25aa253adca6f7dac8dcc77e7fbf9
SHA14d4bc2de96a42c09d9139c5bd58c1b23a0d8ff38
SHA2568e9c2807a952d91fe030700a7cd92ee25e5d50a5721d1e6c175b5b16db97cd93
SHA51255510db0d4a8ec84dc26786801ba64ef4e64039562aa1620cd13c168c62fc7b5f37c03e82cbe4129728861cdfab8400862b2e2334a89c3eadaec6d08654854fc
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{453ef255-e920-4f38-be1d-8e1a4370a94e}\0.1.filtertrie.intermediate.txt.tvrqve
Filesize48B
MD5c6bce2ec0beeb65015171af31252ddfa
SHA121fc3c30a4072f3e00e9a1cfbf7a51e6b1cd446e
SHA2567545778f87797fe1b1e611852719b80869089ab7b3e7fb8f504c18f1773a585a
SHA512862eb20f925c60867127d5f3a9f0157c994a9e8ef9751e68c7cd0e13051e5ac055d41e6ea3b075b7e818f82dde2d81859cbcc2f37e317b0c7d11160b5b98628d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{453ef255-e920-4f38-be1d-8e1a4370a94e}\0.2.filtertrie.intermediate.txt.tvrqve
Filesize48B
MD5241d7f364f5efc781c04772521971bd7
SHA1278f0e4fdd42cb5aa753f5c4d9df738de5381e5b
SHA2560481428696490e7af1c8612baa378029d70d5250cb460413dae260b8b636b1b4
SHA5128328bc727eb46aca62970afd2f51f70fc46082eb4a4b09412bfb71c74d77e0cae97b8c0616653cee7ecddb23dfaf8b576ada51005e11a393bc49d25f57532732
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{453ef255-e920-4f38-be1d-8e1a4370a94e}\_DECRYPT_INFO_tvrqve.html
Filesize12KB
MD5f2e4fd7be64b3fc85aea19360021aa98
SHA1554773e70b518271245c342b5f0b48ec654e5ed7
SHA256c3744418cd97677f3f090f759091250eb1716d238a1cfc6718433f06b24dbda4
SHA512cc38ee5235525f6e965ceea1790179e2b34b03cc078febfc1031881a7cdbba0e29300816399ff55c9c304cbe55118dee1dcd53cbbc6e399ac99065d38c4a9c96
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.rtf
Filesize4KB
MD52d5020c82de674b48cfd17cc20fcbba2
SHA14e317eaeebd839ee5f6eb3925a9fbee819c5349c
SHA256120becd55248f4a2ccbbc99ba9d3c2932223264a95cd72e9ae7568be61277e9a
SHA512ffbbdda009237d6825f6cd6f751a41f4f9d716186901ffdbeed56c2d1410245771decd07f591cf56cafdd4bbebd4e4c74f009ff15736d5321635e34ff17d0d8d
-
Filesize
12KB
MD5560f6c48103e49277f58310f277bcacd
SHA16a7fbbfe5d720f55b76a7f763201275872373a72
SHA256587ed6bd4ec3e662e50bca5705758b21a2d04f01e4b588aacd6a6f1902de9b3b
SHA5127f8121c76d911c937bc9ba8a7c814bfe2b0820e7a2b5d0dd1f4962d0fc6a7cca3ed6d8abd288b4b12d483fe559408806f8d3c262afbb314497b7efde29cc9bda
-
Filesize
12KB
MD5c1e008de08dd8844259dd2d61bd8f4e7
SHA17c3a3cb79e66d28ed9b12279fc58e94653852965
SHA256b0fb19f2c0be8c502121612cd31a06e8147425d8e803d2b9eebaa1ef2dcc2c9f
SHA512f2c54202f359b5603cd64f0f491974431156abf136ebca106c24ff880bbec05234d38a0bbef448fd95e37794a0f9f5d668aec6e889f9af8e17aca5ce2f930c7d