Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-10-2024 17:30

General

  • Target

    801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe

  • Size

    18KB

  • MD5

    f31d6529ff4ad98053f9a8a9832f95e3

  • SHA1

    abdd5ce48e2d11a4c82fc90d9e9beeb14b437cee

  • SHA256

    801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e

  • SHA512

    25e452098a46f3ddf3cc6e268a94fa998d7c0de907741f436d10caf7be8c038163dc3a0f51516f3b4072085951eb5e44053b2e9f84a532c152bbf813a518a755

  • SSDEEP

    384:imwIxiBDXgRUV7JCGgmxt8mvA4ILbfNGHEDPUw3rXTXLazK:i6UVl7twPbfg2Uw3HXAK

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (495) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe
    "C:\Users\Admin\AppData\Local\Temp\801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1816
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Provisioning\{23cb517f-5073-4e96-a202-7fe6122a2271}\MasterDatastore.xml

    Filesize

    272B

    MD5

    201bdedf73f2016eb7ea3b04fb4adf7d

    SHA1

    9eb0b21ceb33fa68d13f900d69154bc92a17caec

    SHA256

    1d8f591d1102fb73716f364bec05ad14b55f24b815e0be9b1d2a55ac5afd2384

    SHA512

    f07de931514da814ee1b5bccaf5fae3b6526538921609e87041d1ee0ce0d2f8646d140d27cedbe2b7a1ab91e936dadfbd6a815ec254910ffa33eb3a4c200cf67

  • C:\ProgramData\Microsoft\Provisioning\{9df6a4ed-fc16-48bf-8b24-6e2ad2bfcfea}\Prov\RunTime.xml

    Filesize

    256B

    MD5

    6159cf6ccc6d095beba98064ab856e4e

    SHA1

    b335446e9d4a2e81b7d3f610f5f87f3d8474512e

    SHA256

    6411b8f6bd28ed6a600e583dd9d2a03f340fb7cea263b61a0f22e50ab9191bca

    SHA512

    ded36507a4bd0288f6ef05c0ec1f08ea3918940a6a02bd5ac151ed39e5a37f688a6d115483602c6eed428dd62b6b19f9c3201f3a33c730bf9acf573ab6466b79

  • C:\ProgramData\Microsoft\Provisioning\{b0b9123d-7d7f-4c6b-9973-ceced46f2a09}\Prov\RunTime.xml

    Filesize

    464B

    MD5

    5c261106c9e88ae9e174342547707c5d

    SHA1

    91b04b0d080439baf3cfcd9c137f84bbde3f6ffc

    SHA256

    435dad09ef4a5b5a316e8f4bdda6666550623c63822d8ed34966c58ee9f437af

    SHA512

    dde32b688137b02563d293a9af1772e2b4a8c3671eb6e42522aef93925fc91e5aafee1376543f6b1bce271a79886824ce9bde04280ba5e29d066f098864d9538

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log

    Filesize

    16B

    MD5

    a013eea1e36146e85f980060ab873ca6

    SHA1

    b1ab5ac7a052dd3d3288c67307c989c78c9b34f2

    SHA256

    c6d018a4f8145c322fb1672530e567a56e711f7eab53076c4160bc1a99c9f816

    SHA512

    f966719407bc125bdddc8113cf6b16c566794b03a8ce432f4c3a4c85a9c93204dd282cf427ec6649e2659287516f3bdceb5df4414fa6582a41ab290175053748

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\winword.exe_Rules.xml

    Filesize

    333KB

    MD5

    88b72dc1bcc9a2b9a1e89e82ed3359e2

    SHA1

    4d0003b141ebf68bcfb5781ef3625113da6653c7

    SHA256

    b3ea9b4ee74530c48a8ae95631ca29ac66411681837e3fd9d4f17ac9b0329ef1

    SHA512

    de924c6f0e9701dc91c72b347cc6590761ecf29339da0703152fcbe0a59ba1f0ca43d2ecdd7bf17b5217a2638d8708b12e7968f2d6f3e29dba52667da2d00388

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{7e66d639-dbb5-4058-a88d-d587ca4b635a}\0.1.filtertrie.intermediate.txt

    Filesize

    16B

    MD5

    7a11aef00a85c1129307941b164590ae

    SHA1

    37de87792cde5a07d3766634de91ca70a070b68b

    SHA256

    fa83dfa46d49fdcd7bd939dec9e4b77849ffa179c15dcb64c8aff492e7c236f5

    SHA512

    8393c8dbb079013bed107bb866c2ef095ae11ea1ceb8818efccf5c05a9e62c45bfefb52a33c5a1192b07465a747556ff657b517343999001e5531d9a70ae6947

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{7e66d639-dbb5-4058-a88d-d587ca4b635a}\0.2.filtertrie.intermediate.txt

    Filesize

    16B

    MD5

    f2da31a460f21aa9ef32b1058bc175bc

    SHA1

    739b7bed75d686bdddf48df9532a4af3807a7222

    SHA256

    61fcf18967bbaf729a2f464de95e1e34d82f2cd9b789f43b80512076319cb783

    SHA512

    ed738350a6535fcfe37d831db5d77e49efdba45ed7d35b6809081047a240b922727224a27815577fb2c5ac8f495c8f25104d68ebac63ea17541883879662e34b

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{aabc41c2-49bd-4a0e-a74a-2a8f0c6feb4e}\0.0.filtertrie.intermediate.txt

    Filesize

    15KB

    MD5

    a4b5187cb82771d376adfc6dfe1a4791

    SHA1

    100a667ab88469fcc17545504787899b1f825070

    SHA256

    1388532fb81fa3fb263862eb7fc897685fcdadc2b0f9dc0ffbad84639964a7a8

    SHA512

    7eaaa341f80d60711ffb7b30ca24679549c12e219e9dfc15e4a25124bbef30722d9e721db721812ac425f277b43cba487254c61492c83a45cc967c17f80e004d

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133567066645589540.txt

    Filesize

    85KB

    MD5

    d4f2144a8232e5ce6a332dee7cb4beec

    SHA1

    171c54bfbe0bf2c1a15b71290a78b6465d8fc1f4

    SHA256

    851ec3471672ec41594d2e8241b321e2961f59ab20e255010c3f034a932dac09

    SHA512

    342e3f87674baed88405bea42790b551cc8718a65497fd7fdee60a6ad82e39047fe52d4ac90dc292a2353dac37254d70b44957fadf3a6297b9067fa72687a888

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133567067454100560.txt

    Filesize

    72KB

    MD5

    93c721fc279d33808cb99fdad6117b28

    SHA1

    9bca0c32b11f662e8a51c6184d0dca2a698d34e3

    SHA256

    49f1cc9630af7341bc4cb7a4ee85593646cd3960b20b0d9214ad011fbb1d46b3

    SHA512

    eac285601f9d4db60cc3311cb1809292f2230dcbe089ed83ff745edf4baee3b6ab3b7e19dbf7e807077e4435a098a1987ef56dd53810549f136ed9fc80470b3b

  • C:\Users\Admin\AppData\Local\TileDataLayer\Database\EDBtmp.log

    Filesize

    2.0MB

    MD5

    24f9df2069e7b074158a427d587f3d4f

    SHA1

    6d976d9e6a8aa821979703e46bc42bad78638718

    SHA256

    a5e5cf082433e8b3f211d191311a34febdacf8876f26303ebce815fb6dcc92e2

    SHA512

    4d566a32431657837bb3bdebc5adf05a8d2d17faf2b1ffc7a8451cb1d97e974d10a1ed66e65ada991cfd5ea90e90103db472df7760ceb7b75b0965d38e92e012

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite.Satyr

    Filesize

    48KB

    MD5

    dc8f1eb068c5654264162763f105d37a

    SHA1

    4c54f7a0f9d95f7c8704e4f1395e490b198e0c48

    SHA256

    9ea6593eccb00389e314a27a06ed6fb74ef5176955fa1a6b3946c9be3ab1e674

    SHA512

    6f1b37ff19b3780a8ddaf59d781d3b8c42305fee440c689d9e785e68ef26f815b93d142b31e02654bb015b4d49d76d80fe941baf3175c2d7c6eb9d2783c3e7ed

  • C:\vcredist2010_x86.log.html

    Filesize

    80KB

    MD5

    71c3261c5f5ded0e87a89842c1087861

    SHA1

    dacc64aa854fa32becaf8bcd5e680e13aedcaf0a

    SHA256

    bf251c02453663012a0f90447f30bb8011eecfa5fa0e4ecbd226ddf64a2cf94c

    SHA512

    ad3ae560a8e90de20f1d1cf5e5a075dab68e4cc6f226bc515f79af854faaa6c11832c101fe96ccb782138db6e55de3416d1efb1d6d4b91f08ea1e08383b78f32

  • memory/2828-720-0x00007FFA7ECD3000-0x00007FFA7ECD4000-memory.dmp

    Filesize

    4KB

  • memory/2828-1-0x0000000000BB0000-0x0000000000BBA000-memory.dmp

    Filesize

    40KB

  • memory/2828-0-0x00007FFA7ECD3000-0x00007FFA7ECD4000-memory.dmp

    Filesize

    4KB

  • memory/2828-993-0x00007FFA7ECD0000-0x00007FFA7F6BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2828-997-0x00007FFA7ECD0000-0x00007FFA7F6BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2828-998-0x00007FFA7ECD0000-0x00007FFA7F6BC000-memory.dmp

    Filesize

    9.9MB