Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
encrypter-windows-gui-x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
encrypter-windows-gui-x86.exe
Resource
win10v2004-20250217-en
General
-
Target
encrypter-windows-gui-x86.exe
-
Size
1.1MB
-
MD5
f1ade7769b7fdc2401798106ec7a9180
-
SHA1
61bd89ed258c4ed8901c6f02e18743607b52247e
-
SHA256
5bd8f9cbd108abc53fb1c44b8d10239a2a0a9dd20c698fd2fb5dc1938ae7ba96
-
SHA512
6795df546a9212e75a969a8f3393da5bd572cf5d1ddeee085c367327b2f038e1822f0f992abbb5b8d59d397670465cb4023eba8f361744950ee2f3dbffc33ff0
-
SSDEEP
24576:UPntpHzhp8e0j+nAZRN7UNFDAp8vj/iXcSDvKP/BEXYWXE:UrHzhp8nSRV6tDvKP/BEIWXE
Malware Config
Extracted
C:\ProgramData\README.TXT
MAIL:[email protected]
https://getsession.org
Signatures
-
Renames multiple (7137) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 1584 cpsonftr.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 encrypter-windows-gui-x86.exe 2248 encrypter-windows-gui-x86.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\{69C03192-FDBC-9B92-914B-5F2CBAAA094E} = "\"C:\\ProgramData\\{69C03192-FDBC-9B92-914B-5F2CBAAA094E}\\cpsonftr.exe\" /V-" cpsonftr.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: cpsonftr.exe File opened (read-only) \??\Z: cpsonftr.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0296277.WMF cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql.nl_ja_4.4.0.v20140623020002.jar cpsonftr.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\README.TXT cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS01634_.WMF cpsonftr.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\vlc.mo cpsonftr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\CST6 cpsonftr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Vienna cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\Synchronization.rll cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-nodes_ja.jar cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.INF cpsonftr.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\liveleak.luac cpsonftr.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\vlc.mo cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\1 Right.accdt cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\TAB_ON.GIF cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\ffjcext.zip cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerActionExceptionHandlers.exsd cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0300912.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382948.JPG cpsonftr.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\REMINDER.WAV cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01357_.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Clarity.xml cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Medium.jpg cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-5 cpsonftr.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\README.TXT cpsonftr.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\SpiderSolitaire.exe.mui cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00006_.WMF cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4ADT cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Costa_Rica cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\bookbig.gif cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_zh_CN.jar cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AWARDHM.POC cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0174639.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00454_.WMF cpsonftr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\La_Paz cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp cpsonftr.exe File created C:\Program Files\Microsoft Games\More Games\en-US\README.TXT cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECREC.CFG cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-bootstrap.xml cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00254_.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199473.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR10F.GIF cpsonftr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\MessageBoxIconImages.jpg cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-enumerations.xml cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-views.xml cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Class.zip cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\msaccess.exe.manifest cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7ES.LEX cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00440_.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01772_.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00526_.WMF cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher_1.3.0.v20140415-2008.jar cpsonftr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-sendopts.xml cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow.css cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00050_.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00513_.WMF cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME11.CSS cpsonftr.exe File created C:\Program Files\Microsoft Games\Hearts\README.TXT cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\TALK21.COM.XML cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0157831.WMF cpsonftr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Zaporozhye cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Couture.thmx cpsonftr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\CLICK.WAV cpsonftr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language encrypter-windows-gui-x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpsonftr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3100 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe 1584 cpsonftr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2248 encrypter-windows-gui-x86.exe Token: SeTakeOwnershipPrivilege 1584 cpsonftr.exe Token: SeBackupPrivilege 2208 vssvc.exe Token: SeRestorePrivilege 2208 vssvc.exe Token: SeAuditPrivilege 2208 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1584 2248 encrypter-windows-gui-x86.exe 30 PID 2248 wrote to memory of 1584 2248 encrypter-windows-gui-x86.exe 30 PID 2248 wrote to memory of 1584 2248 encrypter-windows-gui-x86.exe 30 PID 2248 wrote to memory of 1584 2248 encrypter-windows-gui-x86.exe 30 PID 1584 wrote to memory of 3100 1584 cpsonftr.exe 36 PID 1584 wrote to memory of 3100 1584 cpsonftr.exe 36 PID 1584 wrote to memory of 3100 1584 cpsonftr.exe 36 PID 1584 wrote to memory of 3100 1584 cpsonftr.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\encrypter-windows-gui-x86.exe"C:\Users\Admin\AppData\Local\Temp\encrypter-windows-gui-x86.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\ProgramData\{69C03192-FDBC-9B92-914B-5F2CBAAA094E}\cpsonftr.exe"C:\ProgramData\{69C03192-FDBC-9B92-914B-5F2CBAAA094E}\cpsonftr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.TXT3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3100
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD543c1c3b2bb220b36d04f6df75d4c6867
SHA13102092c89ec70f871e6032d194c68f5882b8fba
SHA2566974f151f2b897a96f6e3be89579e53561bba80ca1fb78028af48406c6302461
SHA51297661d280be7647e814a36f7796de4069228f3128366fb5da9e4f591a096865398219abb057831f1c5dcfaa1f6be46dcaf69debe0030a37e8f1a8fdf998d046c
-
Filesize
576B
MD58fbf776d7daaae0b8423729d829d37c7
SHA191d75567fd98769e549c227d568a8750bf177a28
SHA25619c3c2863b16becc62b093fbb24c92fcb3064797de7c8ab88be83c0d88dd4a6b
SHA512a280b84cf358cc544eced0329b3dc24847f53769a2a7459bc6ee7d971e657aa474bb967061f8cf3585c111fa3f092336dc60f9dd241006d88bbbc15d91cf8d19
-
Filesize
1.1MB
MD5f1ade7769b7fdc2401798106ec7a9180
SHA161bd89ed258c4ed8901c6f02e18743607b52247e
SHA2565bd8f9cbd108abc53fb1c44b8d10239a2a0a9dd20c698fd2fb5dc1938ae7ba96
SHA5126795df546a9212e75a969a8f3393da5bd572cf5d1ddeee085c367327b2f038e1822f0f992abbb5b8d59d397670465cb4023eba8f361744950ee2f3dbffc33ff0