Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
OlympicDestroyer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OlympicDestroyer.exe
Resource
win10v2004-20240802-en
General
-
Target
OlympicDestroyer.exe
-
Size
1.8MB
-
MD5
cfdd16225e67471f5ef54cab9b3a5558
-
SHA1
26de43cc558a4e0e60eddd4dc9321bcb5a0a181c
-
SHA256
edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9
-
SHA512
e1855a872f4db7c17eb22130d9cb205eddde641f1b39ea5de97dfb762fc97dc2347bc6e6e88b9c5a303e1540b4b4bdb19c839c7d3e237348adbfa4b942f24adb
-
SSDEEP
49152:R9dnjRSnRMWHrVDoqNcVhcAwARGcWRrLy3pNq:3dVSRMUrVDEVHLRGdRrLy5N
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Clears Windows event logs 1 TTPs 2 IoCs
Processes:
wevtutil.exewevtutil.exepid Process 2584 wevtutil.exe 2740 wevtutil.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 2852 bcdedit.exe 2868 bcdedit.exe -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2940-18-0x0000000180000000-0x000000018002B000-memory.dmp mimikatz -
Processes:
wbadmin.exepid Process 892 wbadmin.exe -
Executes dropped EXE 3 IoCs
Processes:
ymnks.exetriqq.exe_ald.exepid Process 2788 ymnks.exe 2940 triqq.exe 2716 _ald.exe -
Loads dropped DLL 3 IoCs
Processes:
OlympicDestroyer.exepid Process 1728 OlympicDestroyer.exe 1728 OlympicDestroyer.exe 1728 OlympicDestroyer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
OlympicDestroyer.exeymnks.exe_ald.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OlympicDestroyer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymnks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _ald.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 1752 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
triqq.exepid Process 2940 triqq.exe 2940 triqq.exe 2940 triqq.exe 2940 triqq.exe 2940 triqq.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
OlympicDestroyer.exetriqq.exe_ald.exewbengine.exewevtutil.exewevtutil.exedescription pid Process Token: SeIncreaseQuotaPrivilege 1728 OlympicDestroyer.exe Token: SeSecurityPrivilege 1728 OlympicDestroyer.exe Token: SeTakeOwnershipPrivilege 1728 OlympicDestroyer.exe Token: SeLoadDriverPrivilege 1728 OlympicDestroyer.exe Token: SeSystemProfilePrivilege 1728 OlympicDestroyer.exe Token: SeSystemtimePrivilege 1728 OlympicDestroyer.exe Token: SeProfSingleProcessPrivilege 1728 OlympicDestroyer.exe Token: SeIncBasePriorityPrivilege 1728 OlympicDestroyer.exe Token: SeCreatePagefilePrivilege 1728 OlympicDestroyer.exe Token: SeBackupPrivilege 1728 OlympicDestroyer.exe Token: SeRestorePrivilege 1728 OlympicDestroyer.exe Token: SeShutdownPrivilege 1728 OlympicDestroyer.exe Token: SeDebugPrivilege 1728 OlympicDestroyer.exe Token: SeSystemEnvironmentPrivilege 1728 OlympicDestroyer.exe Token: SeRemoteShutdownPrivilege 1728 OlympicDestroyer.exe Token: SeUndockPrivilege 1728 OlympicDestroyer.exe Token: SeManageVolumePrivilege 1728 OlympicDestroyer.exe Token: 33 1728 OlympicDestroyer.exe Token: 34 1728 OlympicDestroyer.exe Token: 35 1728 OlympicDestroyer.exe Token: SeDebugPrivilege 2940 triqq.exe Token: SeShutdownPrivilege 2716 _ald.exe Token: SeBackupPrivilege 1172 wbengine.exe Token: SeRestorePrivilege 1172 wbengine.exe Token: SeSecurityPrivilege 1172 wbengine.exe Token: SeSecurityPrivilege 2584 wevtutil.exe Token: SeBackupPrivilege 2584 wevtutil.exe Token: SeSecurityPrivilege 2740 wevtutil.exe Token: SeBackupPrivilege 2740 wevtutil.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
OlympicDestroyer.exe_ald.execmd.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 1728 wrote to memory of 2788 1728 OlympicDestroyer.exe 30 PID 1728 wrote to memory of 2788 1728 OlympicDestroyer.exe 30 PID 1728 wrote to memory of 2788 1728 OlympicDestroyer.exe 30 PID 1728 wrote to memory of 2788 1728 OlympicDestroyer.exe 30 PID 1728 wrote to memory of 2940 1728 OlympicDestroyer.exe 31 PID 1728 wrote to memory of 2940 1728 OlympicDestroyer.exe 31 PID 1728 wrote to memory of 2940 1728 OlympicDestroyer.exe 31 PID 1728 wrote to memory of 2940 1728 OlympicDestroyer.exe 31 PID 1728 wrote to memory of 2716 1728 OlympicDestroyer.exe 32 PID 1728 wrote to memory of 2716 1728 OlympicDestroyer.exe 32 PID 1728 wrote to memory of 2716 1728 OlympicDestroyer.exe 32 PID 1728 wrote to memory of 2716 1728 OlympicDestroyer.exe 32 PID 2716 wrote to memory of 2624 2716 _ald.exe 33 PID 2716 wrote to memory of 2624 2716 _ald.exe 33 PID 2716 wrote to memory of 2624 2716 _ald.exe 33 PID 2716 wrote to memory of 2624 2716 _ald.exe 33 PID 2624 wrote to memory of 1752 2624 cmd.exe 35 PID 2624 wrote to memory of 1752 2624 cmd.exe 35 PID 2624 wrote to memory of 1752 2624 cmd.exe 35 PID 2716 wrote to memory of 1396 2716 _ald.exe 36 PID 2716 wrote to memory of 1396 2716 _ald.exe 36 PID 2716 wrote to memory of 1396 2716 _ald.exe 36 PID 2716 wrote to memory of 1396 2716 _ald.exe 36 PID 1396 wrote to memory of 892 1396 cmd.exe 38 PID 1396 wrote to memory of 892 1396 cmd.exe 38 PID 1396 wrote to memory of 892 1396 cmd.exe 38 PID 2716 wrote to memory of 2160 2716 _ald.exe 42 PID 2716 wrote to memory of 2160 2716 _ald.exe 42 PID 2716 wrote to memory of 2160 2716 _ald.exe 42 PID 2716 wrote to memory of 2160 2716 _ald.exe 42 PID 2160 wrote to memory of 2852 2160 cmd.exe 44 PID 2160 wrote to memory of 2852 2160 cmd.exe 44 PID 2160 wrote to memory of 2852 2160 cmd.exe 44 PID 2160 wrote to memory of 2868 2160 cmd.exe 45 PID 2160 wrote to memory of 2868 2160 cmd.exe 45 PID 2160 wrote to memory of 2868 2160 cmd.exe 45 PID 2716 wrote to memory of 2872 2716 _ald.exe 46 PID 2716 wrote to memory of 2872 2716 _ald.exe 46 PID 2716 wrote to memory of 2872 2716 _ald.exe 46 PID 2716 wrote to memory of 2872 2716 _ald.exe 46 PID 2872 wrote to memory of 2584 2872 cmd.exe 48 PID 2872 wrote to memory of 2584 2872 cmd.exe 48 PID 2872 wrote to memory of 2584 2872 cmd.exe 48 PID 2716 wrote to memory of 2320 2716 _ald.exe 49 PID 2716 wrote to memory of 2320 2716 _ald.exe 49 PID 2716 wrote to memory of 2320 2716 _ald.exe 49 PID 2716 wrote to memory of 2320 2716 _ald.exe 49 PID 2320 wrote to memory of 2740 2320 cmd.exe 51 PID 2320 wrote to memory of 2740 2320 cmd.exe 51 PID 2320 wrote to memory of 2740 2320 cmd.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\OlympicDestroyer.exe"C:\Users\Admin\AppData\Local\Temp\OlympicDestroyer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\ymnks.exe123 \\.\pipe\7687412F-EAD4-4485-A09E-A9B88E1CC9942⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\triqq.exe123 \\.\pipe\31E24180-6B98-4F69-A96F-991182EF619F2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\_ald.exe"C:\Users\Admin\AppData\Local\Temp\_ald.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\Windows\system32\vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\Windows\system32\vssadmin.exec:\Windows\system32\vssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin.exe delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet4⤵
- Deletes backup catalog
PID:892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:2852
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wevtutil.exe cl System3⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl System4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wevtutil.exe cl Security3⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2752
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
4Clear Windows Event Logs
1File Deletion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD53c0d740347b0362331c882c2dee96dbf
SHA18350e06f52e5c660bb416b03edb6a5ddc50c3a59
SHA256ae9a4e244a9b3c77d489dee8aeaf35a7c3ba31b210e76d81ef2e91790f052c85
SHA512a701f94b9cdebce6eff2f82552ec7554bf10d99019f8bcd6871ebca804d7519bdcfa3806ac7c7d8e604c3259c61c58b905293fa641c092a8fca8245f91eb0f8f
-
Filesize
277KB
MD5d9c37b937ffde812ae15de885913e101
SHA1ed1cd9e086923797fe2e5fe8ff19685bd2a40072
SHA256f188abc33d351c2254d794b525c5a8b79ea78acd3050cd8d27d3ecfc568c2936
SHA512164f45f3f8336ab450e119c716c30168c8115d5bdac7d220ea6f98a6889eee045092d163e54c2851a378a5d4877e913a342333c8bd0ab5615e34c40ca75e2877
-
Filesize
751KB
MD54f43f03783f9789f804dcf9b9474fa6d
SHA1492d4a4a74099074e26b5dffd0d15434009ccfd9
SHA25619ab44a1343db19741b0e0b06bacce55990b6c8f789815daaf3476e0cc30ebea
SHA512645c2f0a1342732b86a45403fb8b1343bcc18c015c9918d2edf118bbb210fead98aa21f1b66ac5faabd0542583d74e158fbac6d5f0d49827f4eeb58c8ebafd6d