Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
Compenso.Pdf______________________________________________________________.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Compenso.Pdf______________________________________________________________.exe
Resource
win10v2004-20240426-en
General
-
Target
Compenso.Pdf______________________________________________________________.exe
-
Size
446KB
-
MD5
93cbe4ed3d46abe732a124a41e7147a2
-
SHA1
94a24be60d90479ce27f7787a86678472aabdc6e
-
SHA256
89e71eb0a6403725d2f95cb9e6506b8b139a6948a61dc1c5cfedf18648241ec4
-
SHA512
8f46af90d8a2d78da003a8a395fd7f74cc235595238ee3a3e4d87fee2aa4c8abf6ece403bb3726122d3825437f5d079ea1f8d6b275153bb76b3b0d75c243ef09
-
SSDEEP
6144:XOOxeLzWoeNqagVRUvOWcTwlOcTeP8uENXIEQSdO8c/AVxYflxiW:txeHWoA/Wr0lfQ8BfLkIVxYfrd
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts explorer.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ubemymul = "C:\\Windows\\ipinixov.exe" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Compenso.Pdf______________________________________________________________.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 840 set thread context of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 2016 set thread context of 2028 2016 Compenso.Pdf______________________________________________________________.exe 29 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ipinixov.exe explorer.exe File created C:\Windows\ipinixov.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2632 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2628 vssvc.exe Token: SeRestorePrivilege 2628 vssvc.exe Token: SeAuditPrivilege 2628 vssvc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 840 wrote to memory of 2016 840 Compenso.Pdf______________________________________________________________.exe 28 PID 2016 wrote to memory of 2028 2016 Compenso.Pdf______________________________________________________________.exe 29 PID 2016 wrote to memory of 2028 2016 Compenso.Pdf______________________________________________________________.exe 29 PID 2016 wrote to memory of 2028 2016 Compenso.Pdf______________________________________________________________.exe 29 PID 2016 wrote to memory of 2028 2016 Compenso.Pdf______________________________________________________________.exe 29 PID 2016 wrote to memory of 2028 2016 Compenso.Pdf______________________________________________________________.exe 29 PID 2028 wrote to memory of 2632 2028 explorer.exe 30 PID 2028 wrote to memory of 2632 2028 explorer.exe 30 PID 2028 wrote to memory of 2632 2028 explorer.exe 30 PID 2028 wrote to memory of 2632 2028 explorer.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Compenso.Pdf______________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Compenso.Pdf______________________________________________________________.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Compenso.Pdf______________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Compenso.Pdf______________________________________________________________.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:2028 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:2632
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD59db79db6cb4edab84bd158bf26e50e12
SHA16661cc46a228ef880446ce4e19c07cc465d8091c
SHA25630b806f6572a13fb68c4a6112b2f16f90931fabdb4d7441b091ea4867e410061
SHA5125dd5c3a35fd1a50fd308f8cea6dc8a5278000bdefe75b1fc1ae39af07d75a3abb61a816cfc640a40fb42b40993f2aa1b1286bdce8768152f4a68820a6b657457