Analysis

  • max time kernel
    149s
  • max time network
    100s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18-10-2024 17:30

General

  • Target

    801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe

  • Size

    18KB

  • MD5

    f31d6529ff4ad98053f9a8a9832f95e3

  • SHA1

    abdd5ce48e2d11a4c82fc90d9e9beeb14b437cee

  • SHA256

    801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e

  • SHA512

    25e452098a46f3ddf3cc6e268a94fa998d7c0de907741f436d10caf7be8c038163dc3a0f51516f3b4072085951eb5e44053b2e9f84a532c152bbf813a518a755

  • SSDEEP

    384:imwIxiBDXgRUV7JCGgmxt8mvA4ILbfNGHEDPUw3rXTXLazK:i6UVl7twPbfg2Uw3HXAK

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (474) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe
    "C:\Users\Admin\AppData\Local\Temp\801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2408
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log

    Filesize

    16B

    MD5

    351a0208e18b9970d26751f4973ff87f

    SHA1

    656dd5dd2f4a32e8cbf3a0c7b094e324ff293a7b

    SHA256

    47f657b94457f667aac75575ec2ce4b898c9f45682a4a1144b48bdf7d0f54147

    SHA512

    c91f9fe8c935d11bc43fc1f6be3fc0f26e0982b20dcde677b9fe09161b98cb1c84d61895dc4e33b37bca63f9486d59d9c1b1e542e4de61d7b8376fe01c1aee28

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Indexed DB\EDGE\edbtmp.log

    Filesize

    512KB

    MD5

    7f1cfed6eb118f68f2b3fc68acf6506d

    SHA1

    59ff48a71419c610f821b3802ea5b598fe805836

    SHA256

    3b2c0a086e50dc3d7f8750fc05a8e665d1f49dd26bd9f85975cd07360c0f3242

    SHA512

    b25630e9d7ab7678f574bdeef8ec75c01941487df1c0505cc7df74e5e218347e66fe99272bd478f5d045a4d90780ceb27760c22bd712b775197d57fa9b4a8822

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\winword.exe_Rules.xml

    Filesize

    332KB

    MD5

    735cedd45fe1eb923a1d44c7a141d358

    SHA1

    62d559ce728423c894ddabe9688a3f2bd729a6a7

    SHA256

    71fd2d3feb689f02bdb5279c0dd32c42a9551bf786e78b497d37b2a28c560b55

    SHA512

    41b302db431982f4fbc215432346ceeb7241e2a87abe440d4acd07c0d1468c0f30b9e044bc7626e2954b7e91c3c2b268a5caf71813e368ea987973b61ffe6967

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{fc6bed23-b664-4973-be20-9b53ae6b2490}\0.1.filtertrie.intermediate.txt

    Filesize

    16B

    MD5

    fa953f116856e8fa373d2f28bf1ed304

    SHA1

    371777cf8c7e5cfba77b46d56500ae712e82da30

    SHA256

    7abf3f25f05b6f69d1691ff78c66434c3e0018a31d296bb3592096f4cbc0d2aa

    SHA512

    a522ce61c7aef16b6d7050f7efad989f87eaa6f7e13fdb1435e9fd33835e81ce23acc015ea53acae45d7e77d6cce92e5c247fd220b0d07e41b235dc9cdce6946

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{fc6bed23-b664-4973-be20-9b53ae6b2490}\0.2.filtertrie.intermediate.txt

    Filesize

    16B

    MD5

    b94f6443d627c2d8566a36ea339b0b27

    SHA1

    d488ad73016d45abc7d4fdaa2b3b6be356952608

    SHA256

    348e97a92a1a8067403de72d9586d2a11f9843c09223a2b2f16ab27cb370a4f7

    SHA512

    3fdfa06924248df49c2c1e2dae6689583ed03d8ef871650e842f4e7ef4c01a397fe69abc8290b03df8d7932835cbab8028a7309739aa6d0fda20e23c6276ab13

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\places.sqlite-shm

    Filesize

    32KB

    MD5

    a839d30527fcb260fd48ab52d7f23afd

    SHA1

    fe325cd933b4720a0e043ee955d66cfff06281ed

    SHA256

    b1779baba020aa280e3d440b2caa967972aade214d50d958427524756946e218

    SHA512

    6d48fd62f53bd8943d5cb424b637e8cb3dafd40909f01b07be30218f4b4f507ee6e6e938f12eb69e0d753bb98e926d273cf437217b7170db71a9db6151598c73

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p38rro19.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite

    Filesize

    48KB

    MD5

    f2e350380618ad433a8a8dea691eea43

    SHA1

    cad6005a089c93b99fc32712eb076562c1730adf

    SHA256

    55b117f9a590733a237d1f3fa0abe5355538637e50769e92c00b934d6e082e84

    SHA512

    e16e29cf097e845099eeffedf0f5a59906f09b0389d6de08d08a477cb0dcd927b08546dc46400806c31bf2e2f1ba3ae6d8a6ec653811876ebe5958ad9bde4937

  • C:\vcredist2010_x86.log.html

    Filesize

    81KB

    MD5

    57f9f3ad19bde31509f63c1d096d0d45

    SHA1

    b5c3d572df8ef0b3fef93d26707cb89d53f9915c

    SHA256

    796ce2160e6c9a1d935246c908b1e74e8682a6f9b2ce16b1e4b63907209aba2d

    SHA512

    62b25b3e4fd40961d2fc9f1b35aed397a0bccff6c513a8d5d99876da786b3a5d8b28c3a002806fc26e9761eaacd86942c0f15bcfc4f6287155b3256e52dde70c

  • memory/2844-0-0x00007FF81D9B3000-0x00007FF81D9B5000-memory.dmp

    Filesize

    8KB

  • memory/2844-1-0x0000000000820000-0x000000000082A000-memory.dmp

    Filesize

    40KB

  • memory/2844-914-0x00007FF81D9B3000-0x00007FF81D9B5000-memory.dmp

    Filesize

    8KB

  • memory/2844-953-0x00007FF81D9B0000-0x00007FF81E472000-memory.dmp

    Filesize

    10.8MB

  • memory/2844-957-0x00007FF81D9B0000-0x00007FF81E472000-memory.dmp

    Filesize

    10.8MB

  • memory/2844-958-0x00007FF81D9B0000-0x00007FF81E472000-memory.dmp

    Filesize

    10.8MB