Resubmissions
18-04-2024 11:18
240418-ned1xsbd66 1018-04-2024 11:18
240418-nea92abd64 1018-04-2024 11:18
240418-neay9scf7z 1018-04-2024 11:18
240418-neacqscf7y 718-04-2024 11:18
240418-nd92zacf7x 718-04-2024 09:59
240418-lz5chaba8t 7Analysis
-
max time kernel
1795s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
Resource
win11-20240412-en
General
-
Target
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe
-
Size
371KB
-
MD5
eafe645b56c3f5cb746fb5f8504f6035
-
SHA1
f539987de9fe59bff20483ac7a124afafc27036b
-
SHA256
0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94
-
SHA512
61af2cfa960a72b66d54d0ee121acb5c54d455b05eb85fb2d7df2958d3134d348c87a5aef2aa46319532407f7ebf01eaedfb8dd889bb0f67ce5edc067445e806
-
SSDEEP
6144:hnzQnu/cmM1oSigOQT2F8U92Iu7DMVQZhWLv3RXdYX9ji+uhi2PsrhY:dzQnkM1oSiBGI8bxn5W6i+uo20tY
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{ceb59717-d40a-45f9-a495-84bc8499f736}\_DECRYPT_INFO_izuvc.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Extracted
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\_DECRYPT_INFO_izuvc.html
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
http-equiv='Content-Type
Signatures
-
Maktub Locker
Advanced ransomware family capable of offline decryption, generally distributed via .scr email attachments.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (245) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral4/memory/4212-53-0x0000000003BA0000-0x0000000003BA8000-memory.dmp acprotect behavioral4/memory/4212-57-0x0000000003BA0000-0x0000000003BA8000-memory.dmp acprotect behavioral4/memory/4212-56-0x0000000003BA0000-0x0000000003BA8000-memory.dmp acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000\Control Panel\International\Geo\Nation 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1988 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1230272463-3683322193-511842230-1000_Classes\Local Settings 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3104 WINWORD.EXE 3104 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4212 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 4212 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4320 vssvc.exe Token: SeRestorePrivilege 4320 vssvc.exe Token: SeAuditPrivilege 4320 vssvc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3104 WINWORD.EXE 3104 WINWORD.EXE 3104 WINWORD.EXE 3104 WINWORD.EXE 3104 WINWORD.EXE 3104 WINWORD.EXE 3104 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4212 wrote to memory of 3104 4212 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 96 PID 4212 wrote to memory of 3104 4212 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 96 PID 4212 wrote to memory of 1988 4212 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 106 PID 4212 wrote to memory of 1988 4212 0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe 106 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe"C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.rtf" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3104
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4284,i,8757378233529949334,7852422992079505686,262144 --variations-seed-version --mojo-platform-channel-handle=1036 /prefetch:81⤵PID:3904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3852,i,8757378233529949334,7852422992079505686,262144 --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:81⤵PID:1680
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD56ed0a40777714310e8078666810f7d57
SHA1d271e2015799d08a9b7fbe97af173cc2169f6337
SHA25622f81b773e6bcafb280816a17a7462bac1eb9ca64bb7f40b4664dff53b1f4e76
SHA512e96b357c07c18238f47c43693f2d82ca2d26db0410073ae9e196f20ee3cb767fec3257a40b77b81e392a4ada2b991e2ad7967a57bf1886a9ddd72b1afaa2631c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{ca80285c-0f51-4d2f-b891-6e8b2ac7fbbb}\0.1.filtertrie.intermediate.txt.izuvc
Filesize48B
MD51e63e8a9a1b46d875f3a83a536c01d88
SHA1aff7a6387c27db726d5033c217d795a3e53f8313
SHA256eea66386596e6e5c82cd59cb187f2f2bb34d28244cd40eed3c0d0b04ffb486f9
SHA512172e398d68a6d54d9fbaf7e5257d75151831c1fb72f232d019847072d31590cf676977ce008199a373d100dbab01e8b7dd04df66b4606bb7d73c43e795767c20
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{ceb59717-d40a-45f9-a495-84bc8499f736}\_DECRYPT_INFO_izuvc.html
Filesize12KB
MD59003d7c396cefbba05902b2ed110702e
SHA18c99e5be7823c18b85e3ace5c365035bb7148f47
SHA2565a14550d6e77aa4d6c0e291154ac91e2f49ba828273317ce609466b8446c97de
SHA5127e8637181309b651cb9abaa8187f190d5e14ba46ad2faa3f98fcf6819bbd61a6c55042348205cc779612f97953c13787cb17ad65920b5abb41517697d3503b36
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{067ed5b5-96b6-4dde-b15a-f824587767fc}\0.2.filtertrie.intermediate.txt.izuvc
Filesize48B
MD57ac295007c380dbbd2946b2c1daf3e60
SHA10f1a92568e8ebedc300bfdd79d6798aca6d4c17e
SHA25620ab3819a552352aa814b8f5e0b5c74b62072f19f424857cd8577da497c8ed78
SHA5128a3cc8929c9f3d28bd4ca795e284523ab66f15f2c89e18cf3e42029316e29430bbd946cb15c68260ecccc419c5dc57effd648dd798155d6e329ae1bf68d721b3
-
C:\Users\Admin\AppData\Local\Temp\0145f04a8356780d52774ce5f7dd0a02f6d5b321694ed805ce3e27bdf04d3c94.rtf
Filesize4KB
MD52d5020c82de674b48cfd17cc20fcbba2
SHA14e317eaeebd839ee5f6eb3925a9fbee819c5349c
SHA256120becd55248f4a2ccbbc99ba9d3c2932223264a95cd72e9ae7568be61277e9a
SHA512ffbbdda009237d6825f6cd6f751a41f4f9d716186901ffdbeed56c2d1410245771decd07f591cf56cafdd4bbebd4e4c74f009ff15736d5321635e34ff17d0d8d
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e