Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2024 22:30

General

  • Target

    EML246970139981.vbs

  • Size

    10KB

  • MD5

    fb02e84625878e362aae3fd352fc19eb

  • SHA1

    20301d9a3c22269e328170384b105041feae19d0

  • SHA256

    f7168df8b023f2f40e865f8309367c97d7b48d4d9a7cab408af377ed7e4d42a2

  • SHA512

    c4fae6bc5a991449a6c664e0afa91f6a426ab3e7c8440330ca0c86c1bd1534e48361412be6861ebcb2fe060eb68735a9642664ce9284c4c740d83042903a1669

  • SSDEEP

    192:5taGo3X3QHE4pG6/IGx/GGPGQGqGuG7o+e5hlQrEuLMd5ybyEgdh:5I3HQKdeXlQrEuLMdUeh

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\EML246970139981.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\EItVNciJKv.exe
      "C:\Users\Admin\AppData\Local\Temp\EItVNciJKv.exe"
      2⤵
      • Executes dropped EXE
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ykcol.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1988
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\EItVNciJKv.exe"
        3⤵
          PID:1308
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {88F82904-5DE4-4F0D-9AC3-C3DCE04DB843} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All
        2⤵
        • Interacts with shadow copies
        PID:2144
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:2472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e55fca0919c2c3ef39164f8944dea832

      SHA1

      7a019ae37c00019eb6d1378dbf64f6218464f5b9

      SHA256

      d47837d279b8d3a1d7980a6737ed663293c45dd5303fecb6a762e4640f7a2465

      SHA512

      2e5d40ce33ef6e61b5c48c3e46549eaf65c01c8edcb44063ab90e05d64f58995d3597b3a1c3b0c9017d404df90a6841c8e7fa8532937f947d0478154d43da33c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a2f01ef285a3a4cfa767e1dd45667626

      SHA1

      1166123ffbadfbc7f6b1c593fe054a1504914143

      SHA256

      02093bf6c7588ccdef4be02b108f9f6ed48f541395566ae7230b5a5e4493eff6

      SHA512

      53a7cad71f2f14a4899f2ae7b24cc1d0c9ee641ca4d2771a745427795bb6ac053890e37ec80ef3f90e718ef1a92861019132026e452c9325e6cfe0577f6e9ff6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      50a4ac69fb713d06d7550b11e17a1730

      SHA1

      712410fd2ed5feca5cd8ad841e2b0766f4c87cf7

      SHA256

      ee5d09f6f9f1e4391016aae77baa86493785df76732ab97b63c788fd6895bd62

      SHA512

      6952763428d148a7f4f66e80d67a7db52194922e47288651c921a724f41a67aab7ed7aba74982c673fd140e0abb76d5de18ff755031e42aa90db166ac059c913

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      689340ae87c2e976bf3299015013874e

      SHA1

      9c6ffd23b364083b97f869e6269a5f55dd504e8f

      SHA256

      2baa7101f89e87d54c79e73d68b6e01738eed613bcbd930dc9b7c0ef6e5c431b

      SHA512

      144bcd18cae9ec90dd231945cf29d579f9b7f5fd8a1c06adb594b2420bad6961a9b7469ea5ca74f198dbe62c3aefc872932a7d2ebfe6d750da934ac443fa675f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      666555273a5c5960a088f68c239d6fd2

      SHA1

      4bb4a22f3856b0c31d642cd265b37ab206532d01

      SHA256

      b01b92b9a5a0db96ed574520174162aebcc731b613de7a1689c4856467bd1925

      SHA512

      7d51b03f6c20da5192add23d33078cb39fc8b148adbe29fee8d6cb8a61b8057717892fa44e6f16a843c4fa4510adbce2cd44cfef8950c65e01b39cb9c15ad4b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7a6c745b997a323cc420109fc1ee0f8c

      SHA1

      bc0d4a3075180934315d4eea5b944d6024b91add

      SHA256

      25cad8731ac6fbe69364090de4b9778e8ca765d2917c932863a036221367d75a

      SHA512

      1c125d7336851573336ec725e30beef0dd0634e174dd891007609bbd1dcda8fb97b474c6398f6a9a642589a67616fac5888ed3877c81cd8f9f83c54cad19edae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      863c673f5f6a497b9adf4576409010d5

      SHA1

      bc689bbe93ee7598e237788267f1ab3f5ae02fef

      SHA256

      5047926471ce5103d330941ecfa07b748a0767e2992d7f32358746f1f1d55a4f

      SHA512

      b07d1f87ca913acf6cead94a5f57f3566830d2599dac9c49f5be63df6f30ffba697a1e02f4b2cbc5519759aa6f91abf28a008553db67d596733d04bcaa72bf84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      462e90af8b9fa5f4ae3d54800bcb6a78

      SHA1

      d0f6bdfd48c6339ba293c5e9b40501f3b2e67f13

      SHA256

      ebb7349d5bf3bea1ef48d8a7b2b2a08c6d2cd88ddc2ba5bd41ec15a1c5ea1b63

      SHA512

      059d7536ad9eb92f0405d8a9120ca1c8d54d5ffca9329df8c2591984dd13fcf2a2edef0752f9e414cf51c2999e218a2f3adbadd8217fead59f4e87d1f6c1f455

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      af4574b92ef1898aa9724b5c429cf29f

      SHA1

      73053d9d7580addbbd4902a7ed74e90d9dbd21d8

      SHA256

      6e9c22d8e8a29d4a2651e2764f5bdf715ea6336dbeabd7430d6756376abedefa

      SHA512

      1b0b2f890dda17fccbc2012067600706e4314d121393538525ecfca9b879d8eeefbb80ae5bc5be40b455186c2eaa9c367b6ec77e778dba6654443d4d4e470412

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      394fc1676d7fddee1af4b35ef779c110

      SHA1

      b212e981243df85c4572a1312d84bcd7d1aaa227

      SHA256

      d9d3ecd9bcd55adad4fed5065595e6b9d1caa61e4278435632ff39896266a691

      SHA512

      fafd0c00364eed8158260723ab81448c156a91749794d43581ab9d5e2c962ec1b9c351db30ed2902a3ae808fd269670150c566fb0d1d5a34efaf60cbf74675d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      823647b4cdc158e13f714a10a24da00a

      SHA1

      772abfee2ceeada1d0b1a4538144c0c8195f915e

      SHA256

      5f04368d2568258c5036ad994a4d82e11fb34b8d6059a794e195acb603e17e3e

      SHA512

      5d65968d368c741c8001233fd44df52f430041dc69b3bf08e53a85cb65182d3f1c850b1b1d83b62344b07536184a9dacb43aac0acf537a7ac28d5ac61c9f7ee2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eb8d6690baee912ec3bccb180d605dff

      SHA1

      6277672971891afce50489a53f6af85f70bd96b8

      SHA256

      939b63655663320dddf36a83fd3ebabe440f924262ce80af3808a8c4d60b88f5

      SHA512

      0e20884cea50476eabf6857ccf46dfd84e36ca970c8e03f7722df73d726cdbd0d5aae64e75ae6ffa7c9e9cca4eb86ee9e10f8c40838b6ce0a1b98a6ce248a1e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      98f4081557ec3473926597a92d3cf70a

      SHA1

      c03eb1e9631b96f924c9a18cc3931481c7ae4f2d

      SHA256

      dccccbb1c84a38e5f520030789039ef22022da9b3487748bd40e2f8cb1fcadb1

      SHA512

      dd7a89c90c6ae8664ba34a0cc454de2087b3658385d1fc79d699e3c42ad0a50a6d752b991ee8991c6aa6b9bc3b96b6ab9b47d1c95f5d874bf63917c0dc8f7a0f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7f83ac38e3795964bc7775946f70628b

      SHA1

      6465c3a5c7be58e7216e3cc78aa3d4cf314e75b9

      SHA256

      dd6bc0707ceb14ea8122c77d6d0db46b6fe8df4efe0e5f3eb266dbb190b59d5d

      SHA512

      4f951c033e89f7d44d2629ee9c533f9391210e1a385dec261f713c69e5757100f2fee04e2171af82a75c3cee95822fdb5ae53643f8389d65ebff9870005ad218

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      79ee7b7718ea4c9e7a1d1337502c8486

      SHA1

      d2668acdb366ded44f3eee7e90b74886164cdba7

      SHA256

      7062b25f22e268fc25587c61e10593643d8c2582f25bc3052a978cdf3860a376

      SHA512

      394ca45a2de144009ecbf506dd7d356d7ca1ab4d908106b2325dd461b59f9d3b30c59247a1c16f706cecc327e26f883fad4f2bd2c68816938f60a1c890ceae03

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e05950e34a8cbeea395b7c1eb735de6e

      SHA1

      fcf61f1d000e24e847f52d40703d8511e4ffcf16

      SHA256

      1e715a33f7140a390f40f342b6a26af33365f8b4a391edee3e421b33b6505842

      SHA512

      921681f4e709b50ff150add548a88aa0cadb54789d520ae172b575ef13337d38a176c4a8f7f8fcb044f780f06d9ba6b014bd637f33a61afe77f8df35b724a7d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c3099a2c46d163c3a4fdf40c5e6fef0a

      SHA1

      d9f60d6bcdbada8c6504930b4761c0db47e696fc

      SHA256

      3e113e46d19ca2471d5cdf51c4f8643e3fad4348d5d680c243901fa591b7e2c7

      SHA512

      5d3bb16ead49d8240c52dc7052dff91788e2af2b71ae115345cc73000af27a33a63050517bf5223398ee030faf93f67f632ad772a2552f874e82188da8beaaec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      37a070dd2b839d14b18ba05ab570c86b

      SHA1

      3983d034d91708c8330bf3261a7aecb16df581cb

      SHA256

      c3c297f374b6aedea46a68a3238ce474df034b1eeb45d282aefcbc94d0401baa

      SHA512

      1547922186336471d524fa2c46570955ac35a3a50891fe0bf0ee41fa837d22d806eba98e9a81930a9cd070b18c175986a7c94d0e934e37c97d7a655c6b57c358

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      66ab546fee2466ae452521142aea970e

      SHA1

      c2e5ceb530e7388d0ff083743e8212a2cfa33c60

      SHA256

      9045a310b8a0de5c9bfb1dd2ef135f02655a48eeec506d268834d33d3a770a5c

      SHA512

      984722a946f4f5a8e99f997a2d00a05dda56204733057bdb1303282e8d37954a5ddca3c0a624088144ba0ac56aabe6a3cec7aae1c3622adb1afcd4f3b4eb3036

    • C:\Users\Admin\AppData\Local\Temp\Cab3B9.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\EItVNciJKv.exe

      Filesize

      576KB

      MD5

      f62e0d79f8f442903fd5f4f5e9bc47ee

      SHA1

      1f735d691e92301fe06447028f92949bf385301b

      SHA256

      8a58444a95e38acdb229aa1fcbfe207e685d1fb095b4915b7e85ea37a940bab0

      SHA512

      fb4dd2e38e8156b92757d48eabd037a505c96308eb924d5e44e3f84eef8922d4458c1badc269fa35e18da23c5886bb5fe89f30dc4559155d7da578a7e97a4a8d

    • C:\Users\Admin\AppData\Local\Temp\Tar45E.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\Desktop\ykcol.bmp

      Filesize

      3.4MB

      MD5

      6f20b7a4ebecbec7550a2dfc2de1e9d5

      SHA1

      a2b7a5c6117e08b0ac5d990d0d5ccca4ba946701

      SHA256

      7c2359c90940092950d82902b01f1041a805f8a21e55def15c48ed0cf95c7ea8

      SHA512

      ccccf0b62d666f42b55f9df10a343e2d2be8ce4c0b142add765cc337d323c788dc540eb91921fb75f2325ef25b1e9353665545ba5fd2748538620eadfbfedcf3

    • C:\ykcol-fcd8.htm

      Filesize

      9KB

      MD5

      eb6df172098e9b2d81b7f071b5a4ea40

      SHA1

      e267878b6c68f9c896f090b1989ae9d3c43c389d

      SHA256

      264bc540aa4c31957d6391a2593685423d4114e4cc212584e3e1445bebab6aea

      SHA512

      6a0a2ec84954e76df17f06dda992cec98cb3ca5075517915a878b6b03c06e61829d9bbc5878bf0be842cf26c711b4b7500082a1dec725220a854a719ac309e9d

    • memory/1664-276-0x0000000002680000-0x0000000002682000-memory.dmp

      Filesize

      8KB

    • memory/1664-12-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/1664-11-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/1664-13-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/1664-90-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/1664-278-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/1664-10-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/1664-9-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/1664-8-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/2472-277-0x00000000000B0000-0x00000000000B2000-memory.dmp

      Filesize

      8KB