Analysis

  • max time kernel
    141s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 15:51

General

  • Target

    ShinoLocker.exe

  • Size

    190KB

  • MD5

    e67f48d46ef15875aabadea8593b7d64

  • SHA1

    0bd90f8c891f484b535eac7383a4587f3538916c

  • SHA256

    a640cd0d805305e4fdcc8e9c928c86d2c353c42c7bc2685183c5ccd303f7fa21

  • SHA512

    68a7a72c55afabda1a1df9e86cdb6dc206951a6c57bc018b53011945e74ab946741841f5dab1d9da05210e0b22c4127af3d983942c73d86d787c96ca80b189ed

  • SSDEEP

    3072:O6w9+FrD19ZQb5NdBdPrY7zE551QGWiE55k:pubW

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ShinoLocker.exe
    "C:\Users\Admin\AppData\Local\Temp\ShinoLocker.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Windows\System32\vssadmin.exe
      "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:3272
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\AppData\Local\Temp\5dWlA0.txt"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2948
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\DebugRepair.jpeg"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2380
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\InvokeImport.jpeg"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2224
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\OpenPush.wmv"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4440
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\SelectSync.mp4"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3064
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\CompareWatch.docx"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3580
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\ConvertConvertFrom.docm"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3752
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\HideSet.docx"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4116
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\OptimizeSearch.docx"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4044
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\OpenStep.xlsx"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1168
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\SearchSend.xlsb"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4148
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\WriteSet.xlsx"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4920
    • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe
      "C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe" E 3Z3awsih64dJ3KbCl9eXCg== qp3UfXcBMOYVTV5rhliz8g== "C:\Users\Admin\Desktop\WriteSet.xlsx"
      2⤵
      • Executes dropped EXE
      PID:1396
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$RECYCLE.BIN\S-1-5-21-945322488-2060912225-3527527000-1000\$I8X0DP6.xlsx

    Filesize

    102B

    MD5

    1e73424a1b7e9e9e39f4f7bd4de06b34

    SHA1

    328c41b3bcb1db3e4575611519f659947a1bbbbc

    SHA256

    e8c72cd88aebcd49c945a5d939389dedab76e74f2683b76d6374c50a2356fc78

    SHA512

    6a9fd2c305d2e8f4efe112e3e6a0f95539c0af7fc9d9dfb5cca963c50ac2912f01e1adac8afeff0c1f67e579304b8129a6a142483d43313de9af3c38eec6b19e

  • C:\$RECYCLE.BIN\S-1-5-21-945322488-2060912225-3527527000-1000\$IACAYH3.jpeg

    Filesize

    108B

    MD5

    53b9575061fad835b20c311eb83e4d6b

    SHA1

    92a5e5e081cd724a01aa5e5c041d96958aac7368

    SHA256

    c284a239640caf0bdcf10d3342b79fee6226c79c945f0518a27518246ae08297

    SHA512

    0e2732a1a0f28633e38e63048feb477af7c530fe9116e2d18be0750af03183de8640b128cbd63e2ee9120e68016cd7a6cb0a7c8ebd61b36164e91bba1e6f0beb

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\BOPh63cd.exe.log

    Filesize

    342B

    MD5

    1ec1427550351bb2214734c3a95d6c58

    SHA1

    c63cd3a9d621f920abdf23f81d6fc9daab1b2f4d

    SHA256

    ce7440ae6dbefe30761e8400ae5f6d10774ebed5d11000fb4f9437c1af4ab280

    SHA512

    fee49195cd32e3ffe6dfdd3356e2dafc30504d7e20fe97e548fd5508680be8a9f600cfd481058831547bf6737d9ea2087205a4c0b1cfd123abe3749b1591641e

  • C:\Users\Admin\AppData\Local\Temp\5dWlA0.txt

    Filesize

    10B

    MD5

    d1329e65311c35fed8cb5e49fb277481

    SHA1

    ab956bf45e9ccd34efbba0698c605a50b7bc5dec

    SHA256

    adaf9f17cf690f5dcb05b74f04f4d19dab35c6f8655811d23783d866cb9cba18

    SHA512

    aef1dbba8ecce1489cd67f691f48a286842a4984bee02711b4e54eeb97332dc2b8fb32dd0e59e3c53d4851a37cd13a856a3f869bdba32a73ede6265e9d368a38

  • C:\Users\Admin\AppData\Local\Temp\BOPh63cd.exe

    Filesize

    12KB

    MD5

    c139b1b02df2bb767206a8aef33f20dd

    SHA1

    f577d8bd839161bf5101afb4bc553d1cdfeee7c3

    SHA256

    6aef2a20079a06566bb57277e587ff6de38a92f7c7feda0fb341cfaf3aa13834

    SHA512

    3d1b824467b21261cef637982a101f4bfa4a12d540744373d7a18cc489069e9945bffacb663934e04f30bec9ff638bb686f894e797ea02517892bf83b2ba0d4f

  • C:\Users\Admin\AppData\Local\Temp\sMTKeC.lst

    Filesize

    805B

    MD5

    d23d6aa1c122fe65fe4a942af1bda471

    SHA1

    495a646c4d879c132cba034398e57f7add9ebb0d

    SHA256

    dc9a05b852abdebb395154cf2cc3af8f88e2bbb5a87fc563ff9b58abba852b2a

    SHA512

    55234c763a8016cec4f71e741e6bc76926648b95073d18f677d191f4284882a88c00be39752ab601c7e98cbd258578799261dd069c89f20f8443e0d789f62216

  • C:\Users\Admin\AppData\Local\Temp\sMTKeC.lst

    Filesize

    604B

    MD5

    632a3c8de5cee30d48fbd5aeca1b49cb

    SHA1

    42ae85c255d591714064a6aa4d8c15fdf1132629

    SHA256

    c06e9b3b255b87df6a9bd9018e039929bd9a433b95833cf079b917a9e2758d5d

    SHA512

    1cd9dc64fbebe52c8cfed7059a3ee666cfb908b2f8d18f8d9f1edee75dcfadf39edfb811ae3fc97f7f84e844ca70785552196dbdbdf9f6a99f57cc891f1ffd71

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\5f7b5f1e01b83767.automaticDestinations-ms

    Filesize

    11KB

    MD5

    11f54105d1fe97c6b7785e26aa7ab8a7

    SHA1

    679ebd7494ca4aac54709d782913da08bab21c48

    SHA256

    aeda5cc3b5a5a3dd11a767ce0419f9873941d1cdb5a804bf25a2324d80f125dc

    SHA512

    c3a7df64bbe087a783f1a088610ad1ab5a35060158c904b71908b276ad149600abe14083be0ba8f0ae09823b86e5feabf58ec3c5966e7973385744c989cdeb39

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\5f7b5f1e01b83767.automaticDestinations-ms

    Filesize

    11KB

    MD5

    876b814f9455bdf8fda1926edb788393

    SHA1

    e6a547bd0881b6908951bb942910fce6001d00da

    SHA256

    162e0b8ebe4b5105a3ab86494c848e0a8752b886083deb60709f28a56954e48e

    SHA512

    83e0a4303a3c638c151fd53abf613f2426cacf7efd2ebeb3cafb0d569c723472a52809b332b0129d9d39406dcabd0955f22fa2a2ee017046655899343219ee47

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\5f7b5f1e01b83767.automaticDestinations-ms

    Filesize

    11KB

    MD5

    17b6bc29054729b123fdf973fde810bc

    SHA1

    7f6a3a1541b140a776e2d1890bf3eab4df3b4fa0

    SHA256

    ab0f4170db2682bcc45694ab257e115efb2262cbf2643461d876cd98e2c36f8f

    SHA512

    1848d5ebbe0a9757bb50fc1314d4eac658c171e6be6d7bca4bbe3202232bcb0751fb5da98d69e98ca98c5122fb04e0a696c6b96776c6dcb51963ae03cfdf5840

  • C:\Users\Admin\Desktop\CompareWatch.docx

    Filesize

    16KB

    MD5

    9db1bdc032c0a479821d12d7bd669f83

    SHA1

    a79a91c414e43022cec8c9a1eff9fe89a09afa1c

    SHA256

    2014ffb597d68aba17edd06af27c2e411c12061241d7412b5e12b30f4b3b8572

    SHA512

    7a3b3da684e8ee222495a72c5836c861bc3f87fca1f1caa32b8550bb8e2348ee76cf64d9fb72ddbc51bd280d67a313c39dd7b2315eb104b2eeccddbd75aa783e

  • C:\Users\Admin\Desktop\ConvertConvertFrom.docm

    Filesize

    1.1MB

    MD5

    83bd198e8daa6b78ebd3a28f08bfb927

    SHA1

    2ef5bf7b418618160b56fe33d9a0b1aabf52827c

    SHA256

    705b3373d8230f2376eca119c9a6fec6123c73e896181cfe4c7443a8a91ea32a

    SHA512

    190147aca1b18c2278269f93a0c60f2c937ba51b1962a45b4c91753045779335b3e8a5f1c8d344c12e885c9063cd70ab76bb2d98887e274601a3b805f467b52a

  • C:\Users\Admin\Desktop\DebugRepair.jpeg

    Filesize

    652KB

    MD5

    93c75e2eeb381c4f21e62b9aacd3dec9

    SHA1

    f9b4184ec5f9364dfc319d05a94ad39edb87663b

    SHA256

    7a03eeab2873253540b6ef0475fed1342c25673ec21f8994f93a212805415030

    SHA512

    8bd956716505a9213aae4b7aac01033811c74765c9209d663c5d8c6bb7aa6fa46d75ebccba8a58d7fd15d0632aa373064b944bd440a99e4fd51951277308a644

  • C:\Users\Admin\Desktop\HideSet.docx

    Filesize

    14KB

    MD5

    95502a36cdf6be66b3e0cb2d7b3d3371

    SHA1

    5e98ad9a3f19a5bab8150cb0c1ab46126087c287

    SHA256

    673cfeac135457ee6965b5006e6c4882bf7d71a1fe90e4a4965821e8b2123996

    SHA512

    5287c15e88a0e80d0fc292cd382f97ecf831139b616d8743dc13326268542a9d2d61afd7eb3ca239a044ec1653270b63a490149504d5fac2f3801647c631f46b

  • C:\Users\Admin\Desktop\InvokeImport.jpeg

    Filesize

    613KB

    MD5

    3660b75552469bb73f73d40f3ab15b69

    SHA1

    fb1c5aa1399bb231dacd8f4a394a1091022422f7

    SHA256

    012cb7adf46c0d901ac1add7026140efcb200c5cc5c2ef5b37c612fb4cdb5d0e

    SHA512

    703a9047ad0791935f0d69d6efd487ba0a1ecd3ef999026ad957301f5b840ec3986e7b64eaef62190c6a663d945d19c514013ee053af487f89c8016088ac3832

  • C:\Users\Admin\Desktop\OpenPush.wmv

    Filesize

    418KB

    MD5

    c9072f82066d80fa5c66279e4248e84b

    SHA1

    6f0c4ddec16873adde8f0c707fb777f6343118e6

    SHA256

    f50496d0236a521c33bbc6f298511a300b5881ab15d23e814c4e51430ee7caad

    SHA512

    cd3d4481209125960e72fd9c928be67e4fac2045c4edef8807374cc672a0fafffbd7921190edd490f544a62ae39bbaf9761e42b83eef6c8500ab53bb5083c567

  • C:\Users\Admin\Desktop\OpenStep.xlsx

    Filesize

    11KB

    MD5

    283408bde821ed182488b936aee19949

    SHA1

    cd5c2ea9b326489e03a092264c7cfe4123da90c5

    SHA256

    b6cc186201ec591c4493aaf3cdabd813c050869e3690e679aaacfe08b1481767

    SHA512

    347b2c4535fe2122071199cca0814f2a3ea15fe34ca30c541338e03092ef2b806ba38961718f0e03b27beb136aca9ea54905c4896d752d10d9359493d5d0644f

  • C:\Users\Admin\Desktop\OptimizeSearch.docx

    Filesize

    15KB

    MD5

    8ce9b74b41f5ab857a66810738136ee5

    SHA1

    60a80dff8ad37b026c76ed9314b723b66cbfe545

    SHA256

    ebc75424918a91bedfd6109f152dfcd309dc6baaafb9ccc6708d5f267e38a507

    SHA512

    62e549ff3531f2867c435fbc8dd3aefcc7cd260385b2cfae3e56bbc06829c8886524db321c479dce13bcc3f26c414259d8defa35b140c814da66d8319b61cd71

  • C:\Users\Admin\Desktop\SearchSend.xlsb

    Filesize

    379KB

    MD5

    e5fd4abc40d88812f63898c6b7bd7052

    SHA1

    9a33a7772e53619584bbf5f4bb2132bfed3f7fb6

    SHA256

    b4e260d1bf9348556b893c3467dce5a3d1a53ab63e763d804cdd6138310dac3b

    SHA512

    5cd30b1781f00a7880f71c0416078ba7f203e62df2f93583fab2bb224e940d29c4992d362010df2f8a267af8485ad9f0fed1cd7dede7ffab9f15df11b03883b6

  • C:\Users\Admin\Desktop\SelectSync.mp4

    Filesize

    808KB

    MD5

    4421e2fd174f22d64c6288de9dda6ef9

    SHA1

    0c265e19aba12bae130cd0ecd7566ce0b23c85e8

    SHA256

    1ff9e0d20657b3a1e3a96740303b750c2bff0dc9e6577e2342d8745cfcb9ba9e

    SHA512

    97f9a43ade6d73b213da6b9f7c90aa58464ac8c3ee9cae86d45d569cbbc98e9f6c8399be9de239f489fc466eada26f11750a4b17f050909235ac36c12bed44ad

  • C:\Users\Admin\Desktop\WriteSet.xlsx

    Filesize

    10KB

    MD5

    f4b763b379118b4c6adabb32498888b7

    SHA1

    a911e5deff9742be43485b78a5923b5efa7694f4

    SHA256

    17e5fdc8e0bbc352d27697b53b3e44eda9b79b86f59221989a6985517bd2743f

    SHA512

    8a6fffc2b5a9315244d3836d4dd27456622af4c9d5affeb27cf08ef69976d5b1436ac29491fc9de76be2610e02db16f86385a73363b764219d52acd47f207e0b

  • memory/1132-65-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB

  • memory/1132-64-0x00007FF9CB1E5000-0x00007FF9CB1E6000-memory.dmp

    Filesize

    4KB

  • memory/1132-7-0x000000001CC30000-0x000000001CC7C000-memory.dmp

    Filesize

    304KB

  • memory/1132-6-0x0000000001870000-0x0000000001878000-memory.dmp

    Filesize

    32KB

  • memory/1132-5-0x000000001CB00000-0x000000001CB9C000-memory.dmp

    Filesize

    624KB

  • memory/1132-4-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB

  • memory/1132-82-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB

  • memory/1132-3-0x000000001C630000-0x000000001CAFE000-memory.dmp

    Filesize

    4.8MB

  • memory/1132-8-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB

  • memory/1132-2-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB

  • memory/1132-0-0x00007FF9CB1E5000-0x00007FF9CB1E6000-memory.dmp

    Filesize

    4KB

  • memory/1132-116-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB

  • memory/1132-1-0x000000001C0B0000-0x000000001C156000-memory.dmp

    Filesize

    664KB

  • memory/2948-63-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB

  • memory/2948-51-0x00007FF9CAF30000-0x00007FF9CB8D1000-memory.dmp

    Filesize

    9.6MB