Analysis

  • max time kernel
    1561s
  • max time network
    1562s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 08:54

General

  • Target

    63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc.exe

  • Size

    114KB

  • MD5

    0af2e477464520e3599dc58deaef2741

  • SHA1

    eff20e476c1f05198297f61df9013cc02aa8016b

  • SHA256

    63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc

  • SHA512

    83fea75f8038942571f177ceabac360d802692af704ecc6a2f9cb8436340be40d0a543c62dee3d61a2fc3ec656b68e8e68d7e60c5d757dcf60626f585fef6398

  • SSDEEP

    1536:tV4aLxvCy9nFI8EuD6O9+CIWFyKy/awv2I8zEc+n1g5sWjcdnKPltJGDc/Nb92ba:Ey3bJ+Crn48cpnKNtJqcFZ6a

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (8635) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 38 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc.exe
    "C:\Users\Admin\AppData\Local\Temp\63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\__t26F1.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2812
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f
        3⤵
          PID:2980
        • C:\Windows\SysWOW64\reg.exe
          reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f
          3⤵
            PID:2104
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"
            3⤵
              PID:2988
            • C:\Windows\SysWOW64\attrib.exe
              attrib Default.rdp -s -h
              3⤵
              • Views/modifies file attributes
              PID:1300
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\__t955E.tmp.bat
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1448
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin.exe Delete Shadows /All /Quiet
              3⤵
              • Interacts with shadow copies
              PID:2424
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f
              3⤵
                PID:2164
              • C:\Windows\SysWOW64\reg.exe
                reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f
                3⤵
                  PID:1308
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"
                  3⤵
                    PID:1500
                  • C:\Windows\SysWOW64\attrib.exe
                    attrib Default.rdp -s -h
                    3⤵
                    • Views/modifies file attributes
                    PID:2116
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c .bat
                  2⤵
                  • Deletes itself
                  PID:2504
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3008

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini

                Filesize

                1KB

                MD5

                bfd6155cad6649560214389907c68bb9

                SHA1

                57bb1399b6b2706135c60ffa14c3129588a9309c

                SHA256

                4ac8fe723a3213c18cda642a6b5f725778448d77d2c8ce30770c247c42e4ee71

                SHA512

                635970831d125f68bd42f2c4e1629f7e2666330e39a36750ced0ea062a386437a06b000b991405f11be1fd7650eb07304e4ab15a4447fe8e339db3a5293336e9

              • C:\Users\Admin\AppData\Local\Temp\.bat

                Filesize

                256B

                MD5

                c339578d9d74d46b5a47a60d03aae3db

                SHA1

                0e518c1e3e08b811e26e7ea03dc9600c1dbb09f6

                SHA256

                be9c75b14032f33ed33ec165ddb4d7f50dda04017911e56ab3591eeef0022e75

                SHA512

                9ed386de89742b1d7dd65b42394fab747f3e369c305c4de817b3a9f1f6952bdbec91b22d5642c8687a8f9e32ce3f67adf6f69c41981586d2df53feb021c69ef4

              • C:\Users\Admin\AppData\Local\Temp\__t26F1.tmp.bat

                Filesize

                445B

                MD5

                32d8f7a3d0c796cee45f64b63c1cca38

                SHA1

                d58466430a2bba8641bd92c880557379e25b140c

                SHA256

                1a6f73b5c28d1c10f63f2056068c1de61487b8cf8f1dcf7516548df144b3e9ea

                SHA512

                288213b92a03ac750ea319bb23c52e7bdf47f5a47ecb70c905c7610a84c63a3ec0a30801b5880e6def8df2c9f577082072e342198d23a19f64e561923e1ef698

              • C:\Users\Public\Videos\RECOVER-FILES-726.html

                Filesize

                4KB

                MD5

                3d280a62173c1d667a5a2c2d1eaff6ad

                SHA1

                23c22294e5666367a3cfb124d09478ac737c1ae6

                SHA256

                11c440f270d7568dbcf987344eecf628d025b8b1e02f2f83e348f6d6373c86c0

                SHA512

                be997c206092d67f31b46b3d954ffa8388c6d83745da821c67013ea84a0d095750761767476304116afb4d5a122a6eec596b3f97674c04811fb84d38699ba5a8

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.