Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10ca6ec46ee9...52.apk
windows7-x64
3calc.exe
windows7-x64
7ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...68.exe
windows7-x64
7cd2d085998...-0.dll
windows7-x64
8cdffb7e75b...ss.exe
windows7-x64
3cf7382c25a...c9.exe
windows7-x64
6cgi19-alpt...e_.exe
windows7-x64
7chrst.exe
windows7-x64
3ci05l2a.exe
windows7-x64
cl.exe
windows7-x64
7clean.exe
windows7-x64
3coinvault.exe
windows7-x64
9com_loader.exe
windows7-x64
3csrss.ex_.exe
windows7-x64
6d.exe
windows7-x64
3d0a5cfec8e...B3.exe
windows7-x64
7d0a5cfec8e...A6.exe
windows7-x64
7d2164cdbc9...FB.exe
windows7-x64
3d2164cdbc9...08.exe
windows7-x64
7d4439055d2..._1.dll
windows7-x64
3d54d2a216e...96.exe
windows7-x64
7d5f29750a8...c5.apk
windows7-x64
3d6c32b0146...4d.zip
windows7-x64
9d889734783...48.exe
windows7-x64
daaa72f48b...2d.exe
windows7-x64
9ddbf1840bf...e2.exe
windows7-x64
10de882c049b..._3.dll
windows7-x64
3decrypt.exe
windows7-x64
3decrypted.ex_.exe
windows7-x64
6Analysis
-
max time kernel
300s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:21
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
calc.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
chrst.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ci05l2a.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
cl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
com_loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
csrss.ex_.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
d.exe
Resource
win7-20240729-en
Behavioral task
behavioral19
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_Dumped_TDS=4F9911B3.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_TDS=4FA478A6.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_Dumped_TDS=4FB252FB.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_TDS=4FB30D08.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
d4439055d2d63e52ffc23c6d24d89194_86e510605f1ee068bdc1ae306312652a__1.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
d54d2a216e637bcd36e5217cfba98896.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
d5f29750a8cb158d9b89a1e02e8addc5e410d1ddc48e660589144ade47f794c5.apk
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
d6c32b0146f219bdcb5cf524ea9e0047d9b9bd0fd7c395d5b11cbc4c3298824d.zip
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
d889734783273b7158deeae6cf804a6be99c3a5353d94225a4dbe92caf3a3d48.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
daaa72f48bea498c5ac7ce9bc315e585ff11dad04d1eeb0d1b0ce33a28bedf2d.exe
Resource
win7-20240729-en
Behavioral task
behavioral29
Sample
ddbf1840bf626da19d8f3467fe9e20e2.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
de882c049be133a950b6917562bb2313_583a76e23c1998307d702709dadbe103__3.dll
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
decrypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
decrypted.ex_.exe
Resource
win7-20240903-en
General
-
Target
coinvault.exe
-
Size
544KB
-
MD5
b3a7fc445abfba3429094542049063c2
-
SHA1
451d2a60192d5a49c13dd4aed19c15448358969d
-
SHA256
2a5333438bed6532770f7d34b72439006625a9b38fd91f7659e390530cda18fd
-
SHA512
711d5a9a0fe539dc9e12092d360b008cc469cd387606e5a76c703e98b7e71863256cea4dbabf41b69b5d6bf0a7cebc01f2acd445c8d0e3a841f8dc46bc532908
-
SSDEEP
12288:xtMW53Bkb5nG7KC/MIkf74f6Z0PvB5V/EXF:xtJ53m5G7fP+Mi
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vault = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\coinvault.exe\"" coinvault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coinvault.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2820 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1996 coinvault.exe 1996 coinvault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1996 coinvault.exe Token: SeBackupPrivilege 2712 vssvc.exe Token: SeRestorePrivilege 2712 vssvc.exe Token: SeAuditPrivilege 2712 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1352 1996 coinvault.exe 31 PID 1996 wrote to memory of 1352 1996 coinvault.exe 31 PID 1996 wrote to memory of 1352 1996 coinvault.exe 31 PID 1996 wrote to memory of 1352 1996 coinvault.exe 31 PID 1352 wrote to memory of 2772 1352 csc.exe 33 PID 1352 wrote to memory of 2772 1352 csc.exe 33 PID 1352 wrote to memory of 2772 1352 csc.exe 33 PID 1352 wrote to memory of 2772 1352 csc.exe 33 PID 1996 wrote to memory of 2820 1996 coinvault.exe 34 PID 1996 wrote to memory of 2820 1996 coinvault.exe 34 PID 1996 wrote to memory of 2820 1996 coinvault.exe 34 PID 1996 wrote to memory of 2820 1996 coinvault.exe 34 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\coinvault.exe"C:\Users\Admin\AppData\Local\Temp\coinvault.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\opnqzeus.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD21F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD21E.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2820
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55e08ad9db807be96a2c7c3f589c31d44
SHA13419b71cd2327f5bc077b0eb069e7e8a5a264287
SHA25654c550641afa6c5bb40d81e7c7965933cc3a80e1e75672842042f86dc06dd415
SHA512bcb9a4b801b707f93199ba6c8b7bfb058d6e8c850cdc329bb1a1306df02515722d69ead3df3c2620b7f193aed1d3d5bf24f816ce618ea77200584d3169de5879
-
Filesize
13KB
MD53cd8103e150b7b6203013534a2aa8b77
SHA19759ab65f6ff3201b76eb8ddadb0b84d02d07c3a
SHA2567968681a93605c9323bb659639fb708b2779ecfe9f499580b762b9d475f65f55
SHA5120c0ebb67aa559c99ade9a546411400c50f7fed125ac83e5d76e963ffafeb0a1b2f061861f6394d7aa93320b0b0135c0f14687262e7cdad375a28afb621fc298c
-
Filesize
652B
MD578ad251ba5750a7476e7906f6725861f
SHA17034d5bc3a3dcd4220f72f577d98a1a633013030
SHA2566dba8277e092f988237d234cd69150addfc0ff12c8f66f90d4a033f6fbac94b6
SHA512d40b4de9322c77ca681edb7ee6256b21e0c003ae9094a84395f15fdfaa9687b5a1f507fc3aaf912f05c3d97e0eb2532facbc2078f490cb67d1f5073754dc3356
-
Filesize
22KB
MD5876e1e05167f8d7cd0998c864f730338
SHA1b3a0dd03960b49d4620553e53a5194eb7483b30e
SHA25677ce602164e8a8f39684776b8528b710b032f863415334125b33cda12e7b8e2b
SHA512390fd444f4b9e47664b54c9cb6459eb81e1db6f1b63db0e1c126fe17e7049b767bbd47f21894204bd53e3490d7efc8b0a962a5cebeb90e89cabcf0f3cc31f2d8
-
Filesize
347B
MD533b8c26b1db8c7fb503c58e631085d90
SHA1e4b7902d1d20f52be50e4d584953354f7b633759
SHA25627bb2233c5b6c434c84ef2f7c38d5838085fd3ce9c8b9f3da2dcceb3c30ed6ad
SHA512a9be69bd233f292ae49ab1149913064d2e234f1391f4b84fc2111482b9abf46325a306ef6442c1a45e17b72703aeffae5ff46db5b205e34e1e64590143a6f266