Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 23:52

General

  • Target

    Rack/e4ea72a1de2c5e1388cb35eee6beffdae4e06f9fe08f9aca04ad6350e32e338a.exe

  • Size

    468KB

  • MD5

    48e5a248e84d3f9ca932c3d2aeee820b

  • SHA1

    faf92d3340613a28c16e09a333bfbc51637bb7be

  • SHA256

    e4ea72a1de2c5e1388cb35eee6beffdae4e06f9fe08f9aca04ad6350e32e338a

  • SHA512

    571b92d2309fe3e4ecb9d1a85d45d631b7384fcc8051ca3100f1e6fd0d3cda4de71381f366b248ed2959c304152c2664382f1f6506f613fa08981a198ed9bd7e

  • SSDEEP

    12288:l6UZbz+f5GEfSxPblS876KWMor1jRehXBrcKwyYh:bhz+1f+UhCX12

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rack\e4ea72a1de2c5e1388cb35eee6beffdae4e06f9fe08f9aca04ad6350e32e338a.exe
    "C:\Users\Admin\AppData\Local\Temp\Rack\e4ea72a1de2c5e1388cb35eee6beffdae4e06f9fe08f9aca04ad6350e32e338a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\Rack\e4ea72a1de2c5e1388cb35eee6beffdae4e06f9fe08f9aca04ad6350e32e338a.exe
      "C:\Users\Admin\AppData\Local\Temp\Rack\e4ea72a1de2c5e1388cb35eee6beffdae4e06f9fe08f9aca04ad6350e32e338a.exe"
      2⤵
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\system32\explorer.exe"
        3⤵
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\vssadmin.exe
          vssadmin.exe Delete Shadows /All /Quiet
          4⤵
          • System Location Discovery: System Language Discovery
          • Interacts with shadow copies
          PID:2404
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\yjutohakadofiraj\01000000

    Filesize

    468KB

    MD5

    232bc02237b17e36ecca68e66c67018d

    SHA1

    8d1bc1e3b47109a4023f6a140fcf384fd479f96a

    SHA256

    fc8598af73b1a8597ddeb5969a1de900d868cce086883da251fcebd075d1ccfa

    SHA512

    d513c7be7d3dfa6082d3782dd510b3a4c40a9e8b7a6e0607ce35a500b7bad1c0a2e616123a24ffb99a8d3fd394be08509f19adccc68c9009b5706d35f816a6ed

  • memory/2740-17-0x0000000000310000-0x000000000034C000-memory.dmp

    Filesize

    240KB

  • memory/2740-31-0x0000000000310000-0x000000000034C000-memory.dmp

    Filesize

    240KB

  • memory/2740-29-0x0000000000310000-0x000000000034C000-memory.dmp

    Filesize

    240KB

  • memory/2740-21-0x0000000000310000-0x000000000034C000-memory.dmp

    Filesize

    240KB

  • memory/2740-19-0x0000000000310000-0x000000000034C000-memory.dmp

    Filesize

    240KB

  • memory/3052-13-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-3-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-9-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-5-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-11-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-15-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-25-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-14-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3052-7-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB