Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 23:52

General

  • Target

    Rack/fc330047cbdd7edc5776a5ef560e9ca73f3986ccd17f0e775a57b563dd8a2cdd.exe

  • Size

    248KB

  • MD5

    684b51ea1c9252e13066d7fe9d0cecd0

  • SHA1

    f0db492b67f4b46c63db6afaa59a2d33848c4e4b

  • SHA256

    fc330047cbdd7edc5776a5ef560e9ca73f3986ccd17f0e775a57b563dd8a2cdd

  • SHA512

    2afbd8225998bd2f54d3cb9dbebe3e61767a90ac1be0c00c917d6011013e3fb6eb014b47f3df3ca48e0af74a8c4b801d13eb8ca70873ff2dbf7aefa38b2bc25d

  • SSDEEP

    3072:c49kOnGapJGUghQdP984U9k4UQ8l9xTd36oujT9k6G:c49kQzJGUd9fU18l7Td3rujT9k

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rack\fc330047cbdd7edc5776a5ef560e9ca73f3986ccd17f0e775a57b563dd8a2cdd.exe
    "C:\Users\Admin\AppData\Local\Temp\Rack\fc330047cbdd7edc5776a5ef560e9ca73f3986ccd17f0e775a57b563dd8a2cdd.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\system32\explorer.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer Phishing Filter
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Windows\SYSTEM32\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:3504
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\uvoqufaguqolipaz\01000000

    Filesize

    248KB

    MD5

    e6e3936d542a5b3607385b1f7441da99

    SHA1

    10ac743c1e728f4d950c8a32956493c3ac77c4f0

    SHA256

    ea7b84c31552294857e88229075d09639b6eef26679c6173209266955d35c3af

    SHA512

    9349175016effa84c3b99d22e2e765fdb938641c179f225f8dadd7cb3ac83a02d2a7dca8e9d8afc7f07e3a027bff14d51e0ead03b00cc9963fa86142b6e07d40

  • memory/4132-1-0x0000000000D20000-0x0000000000D58000-memory.dmp

    Filesize

    224KB

  • memory/4132-10-0x0000000000D20000-0x0000000000D58000-memory.dmp

    Filesize

    224KB

  • memory/4132-7-0x0000000000D20000-0x0000000000D58000-memory.dmp

    Filesize

    224KB

  • memory/4132-12-0x0000000000D20000-0x0000000000D58000-memory.dmp

    Filesize

    224KB