Overview
overview
10Static
static
100A6172B017F62EAA.exe
windows7-x64
100A6172B017F62EAA.exe
windows10-2004-x64
102891E1D4BAC70EBA.exe
windows7-x64
102891E1D4BAC70EBA.exe
windows10-2004-x64
103472CB2D1AB89AAB.exe
windows7-x64
103472CB2D1AB89AAB.exe
windows10-2004-x64
10613788884CE0093F.exe
windows7-x64
10613788884CE0093F.exe
windows10-2004-x64
107189AED8B8AE6568.exe
windows7-x64
107189AED8B8AE6568.exe
windows10-2004-x64
10CC3B1F89FAA517E4.exe
windows7-x64
10CC3B1F89FAA517E4.exe
windows10-2004-x64
10F5657AC3DC58DC8C.exe
windows7-x64
10F5657AC3DC58DC8C.exe
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 05:01
Behavioral task
behavioral1
Sample
0A6172B017F62EAA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0A6172B017F62EAA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2891E1D4BAC70EBA.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2891E1D4BAC70EBA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3472CB2D1AB89AAB.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3472CB2D1AB89AAB.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
613788884CE0093F.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
613788884CE0093F.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7189AED8B8AE6568.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
7189AED8B8AE6568.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
CC3B1F89FAA517E4.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CC3B1F89FAA517E4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
F5657AC3DC58DC8C.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
F5657AC3DC58DC8C.exe
Resource
win10v2004-20241007-en
General
-
Target
0A6172B017F62EAA.exe
-
Size
137KB
-
MD5
b556893d6f0219bb98468f724aeb06cf
-
SHA1
540d6c29aa4a05564da6bf253fc46fc8793277f1
-
SHA256
a75d6bf3c8cf0fc45b368bd83200d141319c9c67033803a230bd3451a309edff
-
SHA512
3a9c8477dfec35af9e682e197c76a1c1e341cdd4f4c276d1c18beac9ff5b53da394eac8428e66921369a607cd75c2fb7e430466758df508d6974e59f7f901ae9
-
SSDEEP
3072:MLIQ8YzXEMZK1A2czbFk58x+o+EFz9/t2f65q8hn2bIoKb:MstYrEMw6Bxk5zOFNtgJiCUb
Malware Config
Extracted
C:\ProgramData\biobio ransmoware.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9111) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 0A6172B017F62EAA.exe File opened (read-only) \??\D: 0A6172B017F62EAA.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\10.png 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\REMINDER.WAV.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jre7\lib\javafx.properties.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\drag.png 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382952.JPG 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.OPG.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14829_.GIF 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Beirut.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\WMPDMC.exe.mui 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR40F.GIF 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\BG_ADOBE.GIF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-windows_ja.jar.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099190.JPG.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MAPIR.DLL 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MENU.DPV 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\ZY______.PFB.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.ds_1.4.200.v20131126-2331.jar 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-runtime-l1-1-0.dll.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153516.WMF 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FLYER.XML 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\PREVIEW.GIF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21319_.GIF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_PDF.DLL 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.htm 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145879.JPG.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE_COL.HXT.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\OriginFax.Dotx 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\settings.js 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-progress-ui_ja.jar 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00118_.WMF 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178932.JPG.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01838_.GIF 0A6172B017F62EAA.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libgrey_yuv_plugin.dll.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Bangkok 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-awt_ja.jar.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PULLQUOTEBB.POC 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\STRBRST.POC.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\libvisual_plugin.dll 0A6172B017F62EAA.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\biobio ransmoware.txt 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18199_.WMF 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR15F.GIF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\vlc.mo 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\StaticText.jpg 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Mozilla Firefox\mozwer.dll 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXSLE.dll.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\biobio ransmoware.txt 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\STOCKS.XML 0A6172B017F62EAA.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_autodel_plugin.dll.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\BLENDS.INF 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15170_.GIF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14538_.GIF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\Journal.exe.mui 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCFUIUTILITIESDLL.DLL 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0214948.WMF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239057.WMF.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyMergeLetter.dotx.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\STRTEDGE.INF 0A6172B017F62EAA.exe File created C:\Program Files (x86)\Common Files\System\msadc\de-DE\biobio ransmoware.txt 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIBUtils.dll 0A6172B017F62EAA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\OPTINPS.DLL.EMAIL=[[email protected]]ID=[0A6172B017F62EAA].biobio 0A6172B017F62EAA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0A6172B017F62EAA.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2300 vssadmin.exe 2732 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe 2236 0A6172B017F62EAA.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2236 0A6172B017F62EAA.exe Token: SeRestorePrivilege 2236 0A6172B017F62EAA.exe Token: SeBackupPrivilege 2236 0A6172B017F62EAA.exe Token: SeTakeOwnershipPrivilege 2236 0A6172B017F62EAA.exe Token: SeAuditPrivilege 2236 0A6172B017F62EAA.exe Token: SeSecurityPrivilege 2236 0A6172B017F62EAA.exe Token: SeIncBasePriorityPrivilege 2236 0A6172B017F62EAA.exe Token: SeBackupPrivilege 2756 vssvc.exe Token: SeRestorePrivilege 2756 vssvc.exe Token: SeAuditPrivilege 2756 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2228 2236 0A6172B017F62EAA.exe 32 PID 2236 wrote to memory of 2228 2236 0A6172B017F62EAA.exe 32 PID 2236 wrote to memory of 2228 2236 0A6172B017F62EAA.exe 32 PID 2236 wrote to memory of 2228 2236 0A6172B017F62EAA.exe 32 PID 2228 wrote to memory of 2300 2228 cmd.exe 34 PID 2228 wrote to memory of 2300 2228 cmd.exe 34 PID 2228 wrote to memory of 2300 2228 cmd.exe 34 PID 2236 wrote to memory of 1560 2236 0A6172B017F62EAA.exe 38 PID 2236 wrote to memory of 1560 2236 0A6172B017F62EAA.exe 38 PID 2236 wrote to memory of 1560 2236 0A6172B017F62EAA.exe 38 PID 2236 wrote to memory of 1560 2236 0A6172B017F62EAA.exe 38 PID 1560 wrote to memory of 2732 1560 cmd.exe 40 PID 1560 wrote to memory of 2732 1560 cmd.exe 40 PID 1560 wrote to memory of 2732 1560 cmd.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0A6172B017F62EAA.exe"C:\Users\Admin\AppData\Local\Temp\0A6172B017F62EAA.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2732
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2756
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD5a7cf708d497dd6e922f91d33d14f7600
SHA15e4f3f5817004eeaf4bc14a0168d86ed7fcdf6d4
SHA25620a5f1f3bb4614433712df1ffc67273465e766191502b8e932321f1f24fea65d
SHA512d27a32dfcc0835879ed45e221e9857c1165de03a859980f0e29ecd6d5877d832577f7d6b584aa96e24caf7ab7652387d713ef2293412bd10b6b65567ed0bcd42