Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/12/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe
Resource
win10v2004-20241007-en
General
-
Target
d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe
-
Size
881KB
-
MD5
9049faba5517305c44bd5f28398fb6b9
-
SHA1
036c6b32f3e7d7d689c9b4d482091eebcc669bfa
-
SHA256
d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3
-
SHA512
65a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a
-
SSDEEP
12288:I2wMm7l55+OeO+OeNhBBhhBBaELPA081o9baXpL3K+HDFgZUid4X9dCU5+Kazw4t:I2wMm7lfCIL3K+gY9dfcw4h3DX9X1
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe" d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 532 cmd.exe 3564 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3564 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe Token: SeDebugPrivilege 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe Token: SeDebugPrivilege 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe Token: SeIncreaseQuotaPrivilege 856 wmic.exe Token: SeSecurityPrivilege 856 wmic.exe Token: SeTakeOwnershipPrivilege 856 wmic.exe Token: SeLoadDriverPrivilege 856 wmic.exe Token: SeSystemProfilePrivilege 856 wmic.exe Token: SeSystemtimePrivilege 856 wmic.exe Token: SeProfSingleProcessPrivilege 856 wmic.exe Token: SeIncBasePriorityPrivilege 856 wmic.exe Token: SeCreatePagefilePrivilege 856 wmic.exe Token: SeBackupPrivilege 856 wmic.exe Token: SeRestorePrivilege 856 wmic.exe Token: SeShutdownPrivilege 856 wmic.exe Token: SeDebugPrivilege 856 wmic.exe Token: SeSystemEnvironmentPrivilege 856 wmic.exe Token: SeRemoteShutdownPrivilege 856 wmic.exe Token: SeUndockPrivilege 856 wmic.exe Token: SeManageVolumePrivilege 856 wmic.exe Token: 33 856 wmic.exe Token: 34 856 wmic.exe Token: 35 856 wmic.exe Token: 36 856 wmic.exe Token: SeIncreaseQuotaPrivilege 856 wmic.exe Token: SeSecurityPrivilege 856 wmic.exe Token: SeTakeOwnershipPrivilege 856 wmic.exe Token: SeLoadDriverPrivilege 856 wmic.exe Token: SeSystemProfilePrivilege 856 wmic.exe Token: SeSystemtimePrivilege 856 wmic.exe Token: SeProfSingleProcessPrivilege 856 wmic.exe Token: SeIncBasePriorityPrivilege 856 wmic.exe Token: SeCreatePagefilePrivilege 856 wmic.exe Token: SeBackupPrivilege 856 wmic.exe Token: SeRestorePrivilege 856 wmic.exe Token: SeShutdownPrivilege 856 wmic.exe Token: SeDebugPrivilege 856 wmic.exe Token: SeSystemEnvironmentPrivilege 856 wmic.exe Token: SeRemoteShutdownPrivilege 856 wmic.exe Token: SeUndockPrivilege 856 wmic.exe Token: SeManageVolumePrivilege 856 wmic.exe Token: 33 856 wmic.exe Token: 34 856 wmic.exe Token: 35 856 wmic.exe Token: 36 856 wmic.exe Token: SeBackupPrivilege 1704 vssvc.exe Token: SeRestorePrivilege 1704 vssvc.exe Token: SeAuditPrivilege 1704 vssvc.exe Token: SeDebugPrivilege 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe Token: SeDebugPrivilege 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe Token: SeIncreaseQuotaPrivilege 4728 wmic.exe Token: SeSecurityPrivilege 4728 wmic.exe Token: SeTakeOwnershipPrivilege 4728 wmic.exe Token: SeLoadDriverPrivilege 4728 wmic.exe Token: SeSystemProfilePrivilege 4728 wmic.exe Token: SeSystemtimePrivilege 4728 wmic.exe Token: SeProfSingleProcessPrivilege 4728 wmic.exe Token: SeIncBasePriorityPrivilege 4728 wmic.exe Token: SeCreatePagefilePrivilege 4728 wmic.exe Token: SeBackupPrivilege 4728 wmic.exe Token: SeRestorePrivilege 4728 wmic.exe Token: SeShutdownPrivilege 4728 wmic.exe Token: SeDebugPrivilege 4728 wmic.exe Token: SeSystemEnvironmentPrivilege 4728 wmic.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3672 wrote to memory of 856 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 84 PID 3672 wrote to memory of 856 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 84 PID 3672 wrote to memory of 4728 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 99 PID 3672 wrote to memory of 4728 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 99 PID 3672 wrote to memory of 532 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 101 PID 3672 wrote to memory of 532 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 101 PID 3672 wrote to memory of 532 3672 d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe 101 PID 532 wrote to memory of 3564 532 cmd.exe 103 PID 532 wrote to memory of 3564 532 cmd.exe 103 PID 532 wrote to memory of 3564 532 cmd.exe 103 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
\??\c:\Windows\system32\wbem\wmic.exec:\miQALX\miQA\..\..\Windows\miQA\miQA\..\..\system32\miQA\miQA\..\..\wbem\miQA\miQAL\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\DvhujF\Dvhu\..\..\Windows\Dvhu\Dvhu\..\..\system32\Dvhu\Dvhu\..\..\wbem\Dvhu\Dvhuj\..\..\wmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3564
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5307960c2469f75abed430102ea24ce58
SHA14004b7a0da1f5ee204b2645cdf1d8e5bdd68f0dc
SHA2560f5f1fba6a282dc087d2a02344dcff14220261cfffead1aadb12418b6b0b74e0
SHA51297444598857555a7f18d60f2f20930c82663354bd07eda22c710d295dd3d31598d605985abd6c7eaf9215beaf21d42ae15daf65cb4802ce5595b25876794a2bb