Analysis
-
max time kernel
51s -
max time network
49s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-04-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
____ __ __ _____240423 _ _____ ________.exe
Resource
win11-20240412-en
General
-
Target
____ __ __ _____240423 _ _____ ________.exe
-
Size
318KB
-
MD5
bbda482f1ecce55c24e1a444c03da58e
-
SHA1
57f3b40785acb35fd76a56334084a32ab3a41bca
-
SHA256
7e2de46d2c37fb24bee5223bd3f26bd6f49b54688a528a851898b0459adec3cd
-
SHA512
d6e21971ac6226692afcfbbd57cc8fdb178b98cd96f8a6a8a9fb6ce1d66f59323e171493a581f60c37817333db824333a83482aacac3634af4d769b352902adb
-
SSDEEP
3072:dT0VHJezp57AexD5EbZ+AQAZXczGSkr4baGtnzL35AhCgr6e+49AkIKCnXrLcXgc:qczLhMH1Uygc6749RIJXrLcXx5KqbI
Malware Config
Extracted
C:\Users\Admin\README.TXT
http://utox.org
Signatures
-
Renames multiple (140) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
____ __ __ _____240423 _ _____ ________.exedescription ioc process File opened (read-only) \??\F: ____ __ __ _____240423 _ _____ ________.exe File opened (read-only) \??\Z: ____ __ __ _____240423 _ _____ ________.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 5388 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
____ __ __ _____240423 _ _____ ________.exepid process 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe 4140 ____ __ __ _____240423 _ _____ ________.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
____ __ __ _____240423 _ _____ ________.exevssvc.exedescription pid process Token: SeTakeOwnershipPrivilege 4140 ____ __ __ _____240423 _ _____ ________.exe Token: SeBackupPrivilege 892 vssvc.exe Token: SeRestorePrivilege 892 vssvc.exe Token: SeAuditPrivilege 892 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\____ __ __ _____240423 _ _____ ________.exe"C:\Users\Admin\AppData\Local\Temp\____ __ __ _____240423 _ _____ ________.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:892
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.TXT1⤵
- Opens file in notepad (likely ransom note)
PID:5388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ada14f8bea03439fbd03a5df8a1389c2
SHA124fc1a97f00be8647e99ec6eb3134b46f2f84271
SHA2569078bfdd733e1b115b922bc206342ce2c43e4c7c2d6d1ca89867e68936c4567a
SHA512e757ade99ef103d5e6c6919567c614e904b0f1d05094321ce8fbc32c3dd575bae134166024da11f8935b0cf282a36796dbd3922d7e6e78a24c2269ed1c8cc692