Analysis

  • max time kernel
    299s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:39

General

  • Target

    T1_b7afca788487347804156f052c613db5.exe

  • Size

    31KB

  • MD5

    b7afca788487347804156f052c613db5

  • SHA1

    dd3d9703c37589482344460d4c624f50dec7d077

  • SHA256

    a41130085e6e7d7ed320599698d79af44da110a58d761e3dfb35e44500e6ac16

  • SHA512

    a37d6ec993a3d0f19daffc3ff174b05707c12339c4475e88468135bca73572ee9b61fb1eae2fbb7285a3dc893b048da108cc54a0f6dec66983360483720eba7f

  • SSDEEP

    768:eg1mvOSFR8d7OJecatzObxw7S0/o61xOxZKMggzCLYc3qFgxd:egcvOSFR8dVcPbxw7iQk2A/Fgx

Malware Config

Signatures

  • T1Happy

    T1Happy ransomware is a cryptovirus that behaves different than its counterparts.

  • T1happy family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (5449) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables RegEdit via registry modification 1 IoCs
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 16 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\T1_b7afca788487347804156f052c613db5.exe
    "C:\Users\Admin\AppData\Local\Temp\T1_b7afca788487347804156f052c613db5.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3056
    • C:\Windows\SysWOW64\wbem\WMIC.exe
      "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2544
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c takeown /f C:\Windows\"."
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\takeown.exe
        takeown /f C:\Windows\"."
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:2748
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:1020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\EDGE.INF.happy

      Filesize

      560B

      MD5

      dbc5243b65101d62b94f3c71abd492a9

      SHA1

      65d06ffd0ee3b4318173fa2832051010b75ce12c

      SHA256

      e38ccf5cb2b2127518378113f2743bacb174ff328efc75f6719f1537c18c8405

      SHA512

      23a2af9939480ffc3040dff5a79ef224f99b1122b1c8554b55c1d454b12dd0461af69695de45e4029b8b706b8ebea276ca693e5099475e565a6fb65cf0f067da

    • C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14752_.GIF.happy

      Filesize

      688B

      MD5

      bac21b523853b4e0d4cb8d25bab07813

      SHA1

      ec0acc988133f2297877447918ebe268eb84962c

      SHA256

      3c82891fe84d85311f6d91a3e64d83c5f06e5046ab9fa5d1faed7ed102c8e40f

      SHA512

      abfd56474cda5699ee9322d6edf014292b71d7d3d6da0a585f1821453313eb3f29fe15c37f1584800d3c866ab568fa90c5fb2dd585ea840025c88817e3196662

    • C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15057_.GIF.happy

      Filesize

      240B

      MD5

      84c245b9e2bcaa040651c930a68848ba

      SHA1

      8a127f877fee17d7f88e9d584db2d8339548bdc8

      SHA256

      aa4d7d217931d8a6fd9d822c941d559c26820cd5ea247a3754553cdd1a1a43a2

      SHA512

      62ef5cf49ba6a7eabc32bfaf8d018f8bda8fa126cdb75616007d8cfb3caa827f67f41390524e2d3d1c44cdde0d061d4743b72a7d99e6bf8f6666418ae1770830

    • C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21377_.GIF.happy

      Filesize

      192B

      MD5

      762ecbe25b0a0c090f25d54135a2bba9

      SHA1

      5b8bb7260ee48c3a882c782dbaa6c77c934594d1

      SHA256

      d9211ee8f1cdadd8fe3a4bd4c588ae33f3a5fe41cab8f012c1306a01647394a3

      SHA512

      115c516bd4dca3f95bfb0a798b3e433304b710fd0fc8bba6a21115580226c459227f18c30fbd707f55f82b85f3cb9dd3ee20c5ea8385e1dde9616db4d76685d9

    • C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21399_.GIF.happy

      Filesize

      288B

      MD5

      7987e50f723c961b923a647331833535

      SHA1

      def607e5cdffcb3dbeae3323b1677a431595ec70

      SHA256

      8c309b2d6e139db42bdcf11877952f6c0c3b2fe830831203f3ee1540ab2ae66a

      SHA512

      e1cfbc3032aa6952548e47597f33823569582fd1c8689fa9cbf86eb7bd62ab791f9e92312fe8f8814ffa038144aa8af37994077e7d5eac1d6d8a78010eac9ee3

    • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\HEADER.GIF.happy

      Filesize

      272B

      MD5

      45bd5bd092121df1cfcb0489bf47f124

      SHA1

      c65807db9286e2eea58890538ea40cf2e0686c5e

      SHA256

      dec76487284a836d9ebb829452b2a728e42a547d756af7fc8542207b0c77909e

      SHA512

      46f5394a91dff835e572d90a793ff6cebe84ea803401a26e206a8444daa774bb2bfa528a79b6eb74a4c88e3a027deef50ef6a97b45000b82c68c7ddb7818f696

    • memory/3056-0-0x000000007472E000-0x000000007472F000-memory.dmp

      Filesize

      4KB

    • memory/3056-1-0x0000000001040000-0x000000000104E000-memory.dmp

      Filesize

      56KB

    • memory/3056-2-0x0000000074720000-0x0000000074E0E000-memory.dmp

      Filesize

      6.9MB

    • memory/3056-14-0x000000007472E000-0x000000007472F000-memory.dmp

      Filesize

      4KB

    • memory/3056-86-0x0000000074720000-0x0000000074E0E000-memory.dmp

      Filesize

      6.9MB