Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe
Resource
win10v2004-20240802-en
General
-
Target
dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe
-
Size
515KB
-
MD5
a90b7b9b327a86c2e1851dc83c36321c
-
SHA1
3b74ed8f5fabf80b6e70fe8d9d7f7eb770d5a948
-
SHA256
dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b
-
SHA512
8ed05aa30d4b886dacb86eebd75ce7ec2a13fcfee5034f4a61d4ea5d6a7213c7ff6b2e34e6ab45ab074752315666f381a74686ad1af30f1573b735d2211fb6c4
-
SSDEEP
3072:Y6LEBc2jrORnQssIJlc52L/JKY8/d7epmB98g89QP2EKOBzWk29YKvaEAJ:Y8EBc2jMQsdJlpL/J+/dB9rP2GRS
Malware Config
Extracted
C:\ProgramData\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.xyz/
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Renames multiple (60) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 60 IoCs
description ioc Process File opened for modification C:\Program Files\AddSubmit.ps1 dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\InitializeImport.wmx dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\7-Zip\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Crashpad\metadata dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Java\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\ExportAssert.sql dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\InstallUninstall.ico dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Mozilla Firefox\installation_telemetry.json dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\AssertInvoke.search-ms dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\ConvertToOut.mp3 dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\GetInstall.jpg dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\RevokeEdit.tiff dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\SwitchPublish.mp4v dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Google\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\ApproveSplit.snd dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\ReceiveSelect.vsd dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\RenameWrite.bmp dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\7-Zip\7z.sfx dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Common Files\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\PublishPop.ogg dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Crashpad\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Mozilla Firefox\install.log dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\CheckpointUnblock.vssx dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Internet Explorer\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Microsoft Office\ThinAppXManifest.xml dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\RedoClear.js dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\UnlockRedo.3gp dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\WriteComplete.wpl dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Microsoft Office\AppXManifest.xml dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\MoveAdd.M2TS dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\7-Zip\descript.ion dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\dotnet\ThirdPartyNotices.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\EnableRemove.tmp dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\StartFormat.jpg dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\UnlockRename.m3u dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\7-Zip\History.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\dotnet\LICENSE.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Microsoft Office\FileSystemMetadata.xml dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Mozilla Firefox\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.cfg dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\EnableCheckpoint.ppt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\LimitRepair.TS dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\SplitSubmit.mp4v dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Microsoft Office 15\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\OutSelect.jtx dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\PushExit.dib dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\RemovePing.odt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\7-Zip\License.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\LimitDisable.rtf dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files (x86)\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Mozilla Firefox\omni.ja dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\ExportConvert.pptm dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\dotnet\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File opened for modification C:\Program Files\Crashpad\settings.dat dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe File created C:\Program Files\Microsoft Office\readme.txt dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4988 4528 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe 4528 dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 4944 vssvc.exe Token: SeRestorePrivilege 4944 vssvc.exe Token: SeAuditPrivilege 4944 vssvc.exe Token: SeIncreaseQuotaPrivilege 3492 WMIC.exe Token: SeSecurityPrivilege 3492 WMIC.exe Token: SeTakeOwnershipPrivilege 3492 WMIC.exe Token: SeLoadDriverPrivilege 3492 WMIC.exe Token: SeSystemProfilePrivilege 3492 WMIC.exe Token: SeSystemtimePrivilege 3492 WMIC.exe Token: SeProfSingleProcessPrivilege 3492 WMIC.exe Token: SeIncBasePriorityPrivilege 3492 WMIC.exe Token: SeCreatePagefilePrivilege 3492 WMIC.exe Token: SeBackupPrivilege 3492 WMIC.exe Token: SeRestorePrivilege 3492 WMIC.exe Token: SeShutdownPrivilege 3492 WMIC.exe Token: SeDebugPrivilege 3492 WMIC.exe Token: SeSystemEnvironmentPrivilege 3492 WMIC.exe Token: SeRemoteShutdownPrivilege 3492 WMIC.exe Token: SeUndockPrivilege 3492 WMIC.exe Token: SeManageVolumePrivilege 3492 WMIC.exe Token: 33 3492 WMIC.exe Token: 34 3492 WMIC.exe Token: 35 3492 WMIC.exe Token: 36 3492 WMIC.exe Token: SeIncreaseQuotaPrivilege 3492 WMIC.exe Token: SeSecurityPrivilege 3492 WMIC.exe Token: SeTakeOwnershipPrivilege 3492 WMIC.exe Token: SeLoadDriverPrivilege 3492 WMIC.exe Token: SeSystemProfilePrivilege 3492 WMIC.exe Token: SeSystemtimePrivilege 3492 WMIC.exe Token: SeProfSingleProcessPrivilege 3492 WMIC.exe Token: SeIncBasePriorityPrivilege 3492 WMIC.exe Token: SeCreatePagefilePrivilege 3492 WMIC.exe Token: SeBackupPrivilege 3492 WMIC.exe Token: SeRestorePrivilege 3492 WMIC.exe Token: SeShutdownPrivilege 3492 WMIC.exe Token: SeDebugPrivilege 3492 WMIC.exe Token: SeSystemEnvironmentPrivilege 3492 WMIC.exe Token: SeRemoteShutdownPrivilege 3492 WMIC.exe Token: SeUndockPrivilege 3492 WMIC.exe Token: SeManageVolumePrivilege 3492 WMIC.exe Token: 33 3492 WMIC.exe Token: 34 3492 WMIC.exe Token: 35 3492 WMIC.exe Token: 36 3492 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4528 wrote to memory of 4180 4528 dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe 87 PID 4528 wrote to memory of 4180 4528 dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe 87 PID 4180 wrote to memory of 3492 4180 cmd.exe 89 PID 4180 wrote to memory of 3492 4180 cmd.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe"C:\Users\Admin\AppData\Local\Temp\dc90599c236413b0c035900ff99c76cb25a4c93e12175bd1f776a90f5c25bc4b.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4D4E2414-9437-4DC7-AFCE-265A1EAA49D8}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4D4E2414-9437-4DC7-AFCE-265A1EAA49D8}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 10282⤵
- Program crash
PID:4988
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4528 -ip 45281⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5701579edee1063d1b39f483e86fbed79
SHA1ba728b45f74c8fb9fe7cf1e9c01663283c3a06d2
SHA25693aed46310470f2aa10dd3626ed13ae15819c9417497c01b22865664ec01afc8
SHA5127e1ed8fab572f38325b1b0eb9e1b2afae438cf8387eb19d07481d2f09ed00416368701abec1d9c046947a42809ee83dd7859b159876837ff31ef2c23f2d67c96