Analysis

  • max time kernel
    1561s
  • max time network
    1562s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 08:54

General

  • Target

    63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc.exe

  • Size

    114KB

  • MD5

    0af2e477464520e3599dc58deaef2741

  • SHA1

    eff20e476c1f05198297f61df9013cc02aa8016b

  • SHA256

    63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc

  • SHA512

    83fea75f8038942571f177ceabac360d802692af704ecc6a2f9cb8436340be40d0a543c62dee3d61a2fc3ec656b68e8e68d7e60c5d757dcf60626f585fef6398

  • SSDEEP

    1536:tV4aLxvCy9nFI8EuD6O9+CIWFyKy/awv2I8zEc+n1g5sWjcdnKPltJGDc/Nb92ba:Ey3bJ+Crn48cpnKNtJqcFZ6a

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (8635) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 38 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc.exe
    "C:\Users\Admin\AppData\Local\Temp\63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\__t26F1.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2812
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f
        3⤵
          PID:2980
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f
          3⤵
            PID:2104
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"
            3⤵
              PID:2988
            • C:\Windows\SysWOW64\attrib.exe
              attrib Default.rdp -s -h
              3⤵
              • Views/modifies file attributes
              PID:1300
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\__t955E.tmp.bat
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1448
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin.exe Delete Shadows /All /Quiet
              3⤵
              • Interacts with shadow copies
              PID:2424
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f
              3⤵
                PID:2164
              • C:\Windows\SysWOW64\reg.exe
                reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f
                3⤵
                  PID:1308
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"
                  3⤵
                    PID:1500
                  • C:\Windows\SysWOW64\attrib.exe
                    attrib Default.rdp -s -h
                    3⤵
                    • Views/modifies file attributes
                    PID:2116
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c .bat
                  2⤵
                  • Deletes itself
                  PID:2504
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3008

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini

                Filesize

                1KB

                MD5

                bfd6155cad6649560214389907c68bb9

                SHA1

                57bb1399b6b2706135c60ffa14c3129588a9309c

                SHA256

                4ac8fe723a3213c18cda642a6b5f725778448d77d2c8ce30770c247c42e4ee71

                SHA512

                635970831d125f68bd42f2c4e1629f7e2666330e39a36750ced0ea062a386437a06b000b991405f11be1fd7650eb07304e4ab15a4447fe8e339db3a5293336e9

              • C:\Users\Admin\AppData\Local\Temp\.bat

                Filesize

                256B

                MD5

                c339578d9d74d46b5a47a60d03aae3db

                SHA1

                0e518c1e3e08b811e26e7ea03dc9600c1dbb09f6

                SHA256

                be9c75b14032f33ed33ec165ddb4d7f50dda04017911e56ab3591eeef0022e75

                SHA512

                9ed386de89742b1d7dd65b42394fab747f3e369c305c4de817b3a9f1f6952bdbec91b22d5642c8687a8f9e32ce3f67adf6f69c41981586d2df53feb021c69ef4

              • C:\Users\Admin\AppData\Local\Temp\__t26F1.tmp.bat

                Filesize

                445B

                MD5

                32d8f7a3d0c796cee45f64b63c1cca38

                SHA1

                d58466430a2bba8641bd92c880557379e25b140c

                SHA256

                1a6f73b5c28d1c10f63f2056068c1de61487b8cf8f1dcf7516548df144b3e9ea

                SHA512

                288213b92a03ac750ea319bb23c52e7bdf47f5a47ecb70c905c7610a84c63a3ec0a30801b5880e6def8df2c9f577082072e342198d23a19f64e561923e1ef698

              • C:\Users\Public\Videos\RECOVER-FILES-726.html

                Filesize

                4KB

                MD5

                3d280a62173c1d667a5a2c2d1eaff6ad

                SHA1

                23c22294e5666367a3cfb124d09478ac737c1ae6

                SHA256

                11c440f270d7568dbcf987344eecf628d025b8b1e02f2f83e348f6d6373c86c0

                SHA512

                be997c206092d67f31b46b3d954ffa8388c6d83745da821c67013ea84a0d095750761767476304116afb4d5a122a6eec596b3f97674c04811fb84d38699ba5a8