Resubmissions

27-04-2024 15:05

240427-sgathadb21 7

26-04-2024 02:45

240426-c87dsahd43 9

26-04-2024 02:41

240426-c6vxzahd34 3

26-04-2024 02:37

240426-c4f12ahd28 3

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 02:45

General

  • Target

    encrypter_windows_x64.exe

  • Size

    649KB

  • MD5

    cf0d4fc268aff11360d2b7be7c2dfcf3

  • SHA1

    d168449bccb146830e41de28b16712dd6ffd10b3

  • SHA256

    caaa4c02c3903e76f7e85c84fe59ddbcbbd0bb51e87630c501b76e688a8a3480

  • SHA512

    72a58dd148835a6dfee496b70c71438bea9506e50021999e8f79dc1bfa6c68b1afab4cc2450ddb6fb997fe849d57e5c11722a309bda7dd32511325cee2b45555

  • SSDEEP

    12288:hVx8nywcAegpvFdgxaosQqehUeFhJE1JFKqhqV4zRLIxGkT:stcAegoHg1fKqhqV4J23

Score
9/10

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (322) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\encrypter_windows_x64.exe
    C:\Users\Admin\AppData\Local\Temp\encrypter_windows_x64.exe -c 8SyoDWeuGW:K8w8YXPFpgc3mvtMzWJuNHSrxUYtEdSx
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\System32\vssadmin.exe
      "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:3008
    • C:\Windows\System32\wbem\WMIC.exe
      "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3044
    • C:\Windows\System32\wbadmin.exe
      "C:\Windows\System32\wbadmin.exe" delete systemstatebackup
      2⤵
      • Deletes System State backups
      PID:1208
    • C:\Windows\System32\wbadmin.exe
      "C:\Windows\System32\wbadmin.exe" delete catalog-quiet
      2⤵
      • Drops file in Windows directory
      PID:2072
    • C:\Windows\System32\bcdedit.exe
      "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled No
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:2584
    • C:\Windows\System32\bcdedit.exe
      "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:2644
    • C:\Windows\System32\wbadmin.exe
      "C:\Windows\System32\wbadmin.exe" delete systemstatebackup -keepVersions:3
      2⤵
      • Deletes System State backups
      PID:2588
    • C:\Windows\System32\notepad.exe
      "C:\Windows\System32\notepad.exe" \\?\F:\Contact Us.txt
      2⤵
        PID:1564
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\d6b272a2-8f1b-11ee-9e28-7ed9061e9c39\Contact Us.txt

      Filesize

      1KB

      MD5

      6d3b30acbb8d185b53da65d53492bb2c

      SHA1

      6584bcd8f7c4c9d378fbb6eb0ad9dbd456d8e81b

      SHA256

      7d42476f42be746d26b1aabf4a399cba0921ee025a79c1d0d048731c3bf2c26c

      SHA512

      d6e89800a935031ba71675d312568947900e825597e0590d91b4df7697cf05589422bc6e7d4612a0ed2d62e3df5b43f38e67f31681466224fe2cfe3f2c9811fd

    • memory/2392-842-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-843-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-844-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-845-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-846-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-850-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-851-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-852-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-855-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-856-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2392-859-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB