Analysis
-
max time kernel
124s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 16:01
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
General
-
Target
sample.exe
-
Size
280KB
-
MD5
badc00888b75a7a568d5a2b3d0cb6451
-
SHA1
10e2dde399f369bab14eba5acfa06a923394aa33
-
SHA256
994539855377a216b90c1db4f77fdd60dd89aa2296a19345cf19d9591419809e
-
SHA512
5d00ce31011d460a34446469382b4151d0a241853b925b979da4b758336ff3416ef93b77c31666d1b846fc0ab1e242b34c400ef5b8c2f33cc725d1c39d3d4c7f
-
SSDEEP
6144:EjWkd35a63FC6EkbwO+ZfhluCm9At1sotV50DErPtld:EjWk130CbwOouCmouDel
Malware Config
Extracted
C:\MSOCache\All Users\READ_ME_NOTE.txt
https://t.me/returnbackcyberfearcom
Signatures
-
Renames multiple (221) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 sample.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\sample.exe = "C:\\Windows\\sample.exe" sample.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\READ_ME_NOTE.txt sample.exe File created C:\Program Files (x86)\READ_ME_NOTE.txt sample.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sample.exe sample.exe File created C:\Windows\READ_ME_NOTE.txt sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2892 cmd.exe 2664 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 920 NOTEPAD.EXE 2476 NOTEPAD.EXE 788 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2664 PING.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2012 7zG.exe Token: 35 2012 7zG.exe Token: SeSecurityPrivilege 2012 7zG.exe Token: SeRestorePrivilege 2720 7zG.exe Token: 35 2720 7zG.exe Token: SeSecurityPrivilege 2720 7zG.exe Token: SeSecurityPrivilege 2720 7zG.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2012 7zG.exe 2720 7zG.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2312 2084 sample.exe 32 PID 2084 wrote to memory of 2312 2084 sample.exe 32 PID 2084 wrote to memory of 2312 2084 sample.exe 32 PID 2084 wrote to memory of 2312 2084 sample.exe 32 PID 2084 wrote to memory of 2892 2084 sample.exe 33 PID 2084 wrote to memory of 2892 2084 sample.exe 33 PID 2084 wrote to memory of 2892 2084 sample.exe 33 PID 2084 wrote to memory of 2892 2084 sample.exe 33 PID 2892 wrote to memory of 2664 2892 cmd.exe 36 PID 2892 wrote to memory of 2664 2892 cmd.exe 36 PID 2892 wrote to memory of 2664 2892 cmd.exe 36 PID 2892 wrote to memory of 2664 2892 cmd.exe 36 PID 2612 wrote to memory of 2840 2612 rundll32.exe 51 PID 2612 wrote to memory of 2840 2612 rundll32.exe 51 PID 2612 wrote to memory of 2840 2612 rundll32.exe 51 PID 2840 wrote to memory of 788 2840 rundll32.exe 53 PID 2840 wrote to memory of 788 2840 rundll32.exe 53 PID 2840 wrote to memory of 788 2840 rundll32.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\sample.exe"C:\Windows\sample.exe" p r i v e t12⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\cmd.exe/c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\sample.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2664
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\READ_ME_NOTE.txt1⤵
- Opens file in notepad (likely ransom note)
PID:920
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2364
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\READ_ME_NOTE.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2476
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap14101:1082:7zEvent18595 -ad -saa -- "C:\Users\Admin\Desktop\Desktop"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2012
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap12345:698:7zEvent1144 -ad -saa -- "C:\Users\Admin\Desktop\Desktop"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2720
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\111.7z1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\111.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\111.7z3⤵
- Opens file in notepad (likely ransom note)
PID:788
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635B
MD542bba4a0949ea0f73a193f4aa130d777
SHA1c74d96dc21ecbc76822d9eabdd9b7bc6feca69d6
SHA2565364b0c5ea458ab438bd1d9fbfc76a5f6583d913f67344314c30dc8ab3c55b4c
SHA512b909a7ce7b79bcab319758425f8b83a485fafc874c26e2a73d84ea735df2ade868d83b5b53574e857170f48e02df051ddae26c78c05ee5a0ced2196d92f4276c
-
Filesize
3.8MB
MD576e4429eadcab3febc6b67c2cc8a4491
SHA1e35c2318ae0e3fe10142782061403dfe5c678845
SHA256b5f032ebf4a8ce48d5b4d3b3a6f1c581e6c889de7f5badbd70f4362f8606fae7
SHA5122ffbbc297534e23013cd371fc7b461c685c35ada7d38c006112d9bf1cfe7088bf0124c4a97cc9d7eb4f6d097883f4f9851d151314f07b7d1f423adb14de3b25c
-
Filesize
704KB
MD50879653385c3402639873421ffd1d0b7
SHA19585b6c9d6ec3ae36d11e884dc3f311994abaec6
SHA256cc94d53ef1f558707d92940ded8b02af21db3a6cf42cce5deeb302a9afe30548
SHA512952ef2dd23f11e0bc33de57893a291988157d9d6a30cba961a92c1d40ae4709ad5a5bb604c755eac6b1f84daf787b831b9e7c1db85abb94bb374b3a5763c4c36
-
Filesize
340KB
MD55e9021be717265b3016b27b3364b4e0f
SHA1f677f19e2d8f36d826393d83a8f21dc7fa1ae91f
SHA256e5b39ea03705812de660c4235aa6582db0c56a21d977bc208024ecf55953ad60
SHA5128fe413b828ab8ecd3cf52a561b4fd5b1bd5a4d20aaf569017fd7d5ce58afc9a0e8d03a954beba343feb708753f12f71beefebfdc2a480e95a2f68cd1c34b6aed
-
Filesize
818KB
MD56f1ec21095e2f3fc3333533f8f734f34
SHA166523ab97e074d5e0ae58d2d0e9342e619d4bd82
SHA256019fb5d9ffdb63792729e4adbb896e2f84b697815df744fbd49b4b86dd9b8d23
SHA512d42f6b6b82e1b25683cd9af0cdb1e4a762b289a3033829d908acabfae2682423846952d904dde001800d6258bb95b17abd62d5cc64335f92ea26f5b6d1a25c3a
-
Filesize
499KB
MD5a4b1e503ca6265f698b4a7ddd8caeaa9
SHA1b84709953f10fca2e2099a08423c2ccecd27eb01
SHA2567237ee52706e78dda52e177b5d459ad71bf975ed0b830d7c6a672c3459c27c74
SHA512308fecaf8dba74588b455026cf93c2b88a0f15a9ff78122f9253d761d78d69c6d25cc9df68e4d71d3bd7e1b524353eb531ca01c1c810d730b23ce5553a6fce6b
-
Filesize
749KB
MD503304166edcb586a0628bb6bca723275
SHA1bcdf68b6f14728479e555426ea36ef9160aaa1b5
SHA2569a971e88669365b287bb49d6b509de9e668f84f5815a20eeb2866aa4f01dd5a1
SHA5127269292f3df0ceade1afef96d5a73df0f55c0aaa0101d8be95ed2355ef41ef1b07d73f72a81c8b0e679281385c8a1a0660c3c749ab7fc74178c3083360dbc4bd
-
Filesize
727KB
MD58ca5dd641adb16d9303b81bc54b282c7
SHA14053d3d2f469fde78d8bdf1a7a1c0ea606aa6f5d
SHA256de24253dc9536e5af5cfeca596427cd50ff66c83f5295f86cf5373e8ab60592c
SHA512b43beb4f509eba28e1efbb43f57ddbac47a099e0c3f74c14c1a2b04f78b91aa912e7e59bc8899a3c69f7109f692dbca5fc7a731b046e9b2dd183301051fa0e11
-
Filesize
280KB
MD5badc00888b75a7a568d5a2b3d0cb6451
SHA110e2dde399f369bab14eba5acfa06a923394aa33
SHA256994539855377a216b90c1db4f77fdd60dd89aa2296a19345cf19d9591419809e
SHA5125d00ce31011d460a34446469382b4151d0a241853b925b979da4b758336ff3416ef93b77c31666d1b846fc0ab1e242b34c400ef5b8c2f33cc725d1c39d3d4c7f