Resubmissions
18/04/2024, 05:22
240418-f2z8nscc74 1018/04/2024, 05:22
240418-f2njwade8w 1018/04/2024, 05:21
240418-f2gfkade8s 718/04/2024, 05:21
240418-f2csdacc53 1018/04/2024, 05:21
240418-f2b6vade7x 7Analysis
-
max time kernel
592s -
max time network
585s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
Resource
win11-20240412-en
General
-
Target
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe
-
Size
371KB
-
MD5
bb8cd5df2be7e8bcc5be439675b3d0a2
-
SHA1
627ac60f64974d5caaf81c2de8ca0977c91f4219
-
SHA256
d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a
-
SHA512
57031eb7d7b2c27d7ecacdc085d07065ced46a742128f9818f62c9fe6633c31aa8eb20ffc52c8415613787946060f5a6b5adf8b977d5ca4fed9656233ebd9cfa
-
SSDEEP
6144:tnzQnu/cmM1oSigOQT2F8U92Iu7DMVQZhWLvLRXdYX9ji+uhi2PsrhY:hzQnkM1oSiBGI8bxn5m6i+uo20tY
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{e9f37970-0ce0-4373-a561-300cf94dde5f}\_DECRYPT_INFO_kewdxn.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\_DECRYPT_INFO_kewdxn.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\Users\Admin\Searches\_DECRYPT_INFO_kewdxn.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\_DECRYPT_INFO_kewdxn.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Signatures
-
Maktub Locker
Advanced ransomware family capable of offline decryption, generally distributed via .scr email attachments.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (238) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral3/memory/4472-226-0x0000000003990000-0x0000000003998000-memory.dmp acprotect behavioral3/memory/4472-230-0x0000000003990000-0x0000000003998000-memory.dmp acprotect behavioral3/memory/4472-229-0x0000000003990000-0x0000000003998000-memory.dmp acprotect -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2292 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1904658062-880901768-3903781817-1000_Classes\Local Settings d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3292 WINWORD.EXE 3292 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 612 vssvc.exe Token: SeRestorePrivilege 612 vssvc.exe Token: SeAuditPrivilege 612 vssvc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3292 WINWORD.EXE 3292 WINWORD.EXE 3292 WINWORD.EXE 3292 WINWORD.EXE 3292 WINWORD.EXE 3292 WINWORD.EXE 3292 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4472 wrote to memory of 3292 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 73 PID 4472 wrote to memory of 3292 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 73 PID 4472 wrote to memory of 2292 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 78 PID 4472 wrote to memory of 2292 4472 d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe 78 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe"C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.rtf" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3292
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2292
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD58f0385282c378e2a2a949a0f83d10fda
SHA1fc667f7ddb4b9ac16ce335559adbfdc7b639f41d
SHA2563db9e1b2ce4a22b0c3013abfd5aa4cdc19b211a9cf8862fe1a29cbcead43e0ad
SHA512a8c12ba47f339bb2229fabe2eca393f7283b8d17dd804c29d09d41f4c9808f4520f8333de437cb25052ff6915767613c921772eac35ece38a1540b66ace7da2c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{2b47d48c-03c4-4c00-a535-df0c58b2b051}\0.1.filtertrie.intermediate.txt.kewdxn
Filesize48B
MD5908b0084f43617e6e6c45dcb2452dff4
SHA10d97bbae08011ee1ba26e94851d6ba321e1fddf6
SHA2566fa7649d0bbef3fea138cfdcb5665d4264e535768f1e0e46553afd25cb4fd6f2
SHA512a26bb27e7dce70f063680bbe01ba0ecca983ebb772c815dad8807d22871237cd1be952dc26f6dc6ccc0cdbb6c3fcd8ac30d6ca1a29151a129b17bfa84d230779
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{85a28a22-896a-41ef-8a33-66a83fe7442d}\0.2.filtertrie.intermediate.txt.kewdxn
Filesize48B
MD527877f2130721822ef44c97015015cd0
SHA1e51b12c98ed248dade02165cadec482a34ef08d5
SHA25612d86ec25fc3facf2286b0ed4cca9ccd83d5341ec7d03aa6fe7a4d91c9be30e4
SHA512fdf68120a760d3d516b866bdcfdf583457666e8e442265eb93eee1d64d8a404624db70c48a6e36d93f4354cdfcf7f00e2e58ef7ee3bae5fbd4f24e374675116b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{e9f37970-0ce0-4373-a561-300cf94dde5f}\_DECRYPT_INFO_kewdxn.html
Filesize12KB
MD53ae63d82d250dffffa7199fab94701ef
SHA1ef90ebf2be441d50cd6867e5884339697f89798d
SHA256fe735895dc097528c9b91c2a1bbc6c6fff14217c1c9642eebe69442833392e85
SHA5124551548951fd137d3ff6fecd158c6f7e449ac4c06b0803b44c76ee7c60bf66aa726506fd19e6cca2d9a74c74d6c561e811bfe1c46eb57539075df92597f25d64
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
C:\Users\Admin\AppData\Local\Temp\d351ac17dc0d9476ef029484a165f99e258f546bba2d619b1c6485cb8875ac7a.rtf
Filesize4KB
MD52d5020c82de674b48cfd17cc20fcbba2
SHA14e317eaeebd839ee5f6eb3925a9fbee819c5349c
SHA256120becd55248f4a2ccbbc99ba9d3c2932223264a95cd72e9ae7568be61277e9a
SHA512ffbbdda009237d6825f6cd6f751a41f4f9d716186901ffdbeed56c2d1410245771decd07f591cf56cafdd4bbebd4e4c74f009ff15736d5321635e34ff17d0d8d
-
Filesize
12KB
MD51e95c448db32200e8fe3c86efd9a0b71
SHA10be1df4aeec2314326c4f3fc1f965a1d2f9bcf90
SHA2566d0e29069f795701270661faddee64a65a8d4e0e98eb7f6df8d764a94b977913
SHA5124da47fa0b5c490cba68759c1d2ecce1a49141ee5001060d16f621956842a2d10fae9fb17e8959b2fb85f6eb23def0c9baabcad8698631ac3edbe6241c8b0f0df
-
Filesize
12KB
MD5c02e54ef7dbd817a84bc54e2fe5679c5
SHA1d967abe98fbbc515fabd9cd5382035c3a5103943
SHA2568f47566cb9e82e7ceb3e9116707f3448caaa56352b02c4c528593c995c2b1c19
SHA512366c92893672d331a94a886995e01bb803bdefefad33926573096abaf2ca55f27178c112e84058813c78f3d935e9a54eb0052abe2d8551cd1054447a5f73ab4f