Overview
overview
10Static
static
107d98972d5c...9c.exe
windows10-2004-x64
97d98972d5c...9c.exe
windows7-x64
97d98972d5c...9c.exe
windows10-2004-x64
97d98972d5c...9c.exe
windows10-ltsc_2021-x64
97d98972d5c...9c.exe
windows11-21h2-x64
987b9b910d5...cb.exe
windows10-ltsc_2021-x64
1087b9b910d5...cb.exe
windows7-x64
1087b9b910d5...cb.exe
windows10-2004-x64
1087b9b910d5...cb.exe
windows10-ltsc_2021-x64
1087b9b910d5...cb.exe
windows11-21h2-x64
108958d7b8c5...e2.exe
windows10-ltsc_2021-x64
108958d7b8c5...e2.exe
windows7-x64
108958d7b8c5...e2.exe
windows10-2004-x64
108958d7b8c5...e2.exe
windows10-ltsc_2021-x64
108958d7b8c5...e2.exe
windows11-21h2-x64
10ab5be9e691...09.exe
windows10-ltsc_2021-x64
10ab5be9e691...09.exe
windows7-x64
10ab5be9e691...09.exe
windows10-2004-x64
10ab5be9e691...09.exe
windows10-ltsc_2021-x64
10ab5be9e691...09.exe
windows11-21h2-x64
10b228a698ee...c0.exe
windows11-21h2-x64
b228a698ee...c0.exe
windows7-x64
b228a698ee...c0.exe
windows10-2004-x64
b228a698ee...c0.exe
windows10-ltsc_2021-x64
b228a698ee...c0.exe
windows11-21h2-x64
c864a70f78...1d.exe
windows10-ltsc_2021-x64
c864a70f78...1d.exe
windows7-x64
c864a70f78...1d.exe
windows10-2004-x64
c864a70f78...1d.exe
windows10-ltsc_2021-x64
c864a70f78...1d.exe
windows11-21h2-x64
Resubmissions
25/03/2025, 13:12
250325-qfl42aznw9 1025/03/2025, 13:09
250325-qdtq4aznv6 1025/03/2025, 13:05
250325-qbtcjszns3 1025/03/2025, 13:01
250325-p9k86awxat 1025/03/2025, 12:55
250325-p58tnawwe1 1025/03/2025, 12:51
250325-p3txqazmt6 1005/02/2025, 11:16
250205-ndjvsavrdm 1016/07/2024, 08:54
240716-kt64gavakp 10Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Resource
win11-20250314-en
Behavioral task
behavioral6
Sample
87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
8958d7b8c51215d6a27444b2760f1ce843a414d380052e6e71c2af6e9ab69ce2.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral12
Sample
8958d7b8c51215d6a27444b2760f1ce843a414d380052e6e71c2af6e9ab69ce2.exe
Resource
win7-20250207-en
Behavioral task
behavioral13
Sample
8958d7b8c51215d6a27444b2760f1ce843a414d380052e6e71c2af6e9ab69ce2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
8958d7b8c51215d6a27444b2760f1ce843a414d380052e6e71c2af6e9ab69ce2.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
8958d7b8c51215d6a27444b2760f1ce843a414d380052e6e71c2af6e9ab69ce2.exe
Resource
win11-20250314-en
Behavioral task
behavioral16
Sample
ab5be9e6911b43f0974e01dabec772b968274d9b5ea39ba2ad7cd294056e5d09.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral17
Sample
ab5be9e6911b43f0974e01dabec772b968274d9b5ea39ba2ad7cd294056e5d09.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ab5be9e6911b43f0974e01dabec772b968274d9b5ea39ba2ad7cd294056e5d09.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ab5be9e6911b43f0974e01dabec772b968274d9b5ea39ba2ad7cd294056e5d09.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
ab5be9e6911b43f0974e01dabec772b968274d9b5ea39ba2ad7cd294056e5d09.exe
Resource
win11-20250314-en
Behavioral task
behavioral21
Sample
b228a698ee826b42e19307f2d34c2620819a67a0e98fd2af08aae570b8178cc0.exe
Resource
win11-20250313-en
Behavioral task
behavioral22
Sample
b228a698ee826b42e19307f2d34c2620819a67a0e98fd2af08aae570b8178cc0.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
b228a698ee826b42e19307f2d34c2620819a67a0e98fd2af08aae570b8178cc0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
b228a698ee826b42e19307f2d34c2620819a67a0e98fd2af08aae570b8178cc0.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
b228a698ee826b42e19307f2d34c2620819a67a0e98fd2af08aae570b8178cc0.exe
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
c864a70f78fb972f505ae5b13c0ad984e64c547194beb258926bb4c323fac31d.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral27
Sample
c864a70f78fb972f505ae5b13c0ad984e64c547194beb258926bb4c323fac31d.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c864a70f78fb972f505ae5b13c0ad984e64c547194beb258926bb4c323fac31d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c864a70f78fb972f505ae5b13c0ad984e64c547194beb258926bb4c323fac31d.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
c864a70f78fb972f505ae5b13c0ad984e64c547194beb258926bb4c323fac31d.exe
Resource
win11-20250313-en
General
-
Target
87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe
-
Size
79KB
-
MD5
c8579ccb6690e1f2102f9ba887c12f9e
-
SHA1
e8e46e3f88011aa43c90cde3c9945e3508986a25
-
SHA256
87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb
-
SHA512
f579e9b39400a0b3879dc8a1c41bd829d8f6b399d9d0a97302f7157a76f036ede5e4391eeb12bd2285a7f523969d572a92f482cf415ed2fb023d96d745f82244
-
SSDEEP
1536:hxpkWBeG/vEbKsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Xsf8:/BeQsKsrQLOJgY8Zp8LHD4XWaNH71dLH
Malware Config
Extracted
C:\Users\Admin\Contacts\How To Restore Your Files.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (211) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\A: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\K: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\N: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\E: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\Y: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\U: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\O: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\X: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\B: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\M: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\F: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\W: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\R: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\P: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\S: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\L: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\Z: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\T: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\G: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\H: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\J: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\V: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe File opened (read-only) \??\Q: 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2796 vssadmin.exe 2900 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 844 vssvc.exe Token: SeRestorePrivilege 844 vssvc.exe Token: SeAuditPrivilege 844 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1908 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 30 PID 2012 wrote to memory of 1908 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 30 PID 2012 wrote to memory of 1908 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 30 PID 2012 wrote to memory of 1908 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 30 PID 1908 wrote to memory of 2796 1908 cmd.exe 32 PID 1908 wrote to memory of 2796 1908 cmd.exe 32 PID 1908 wrote to memory of 2796 1908 cmd.exe 32 PID 2012 wrote to memory of 2732 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 36 PID 2012 wrote to memory of 2732 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 36 PID 2012 wrote to memory of 2732 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 36 PID 2012 wrote to memory of 2732 2012 87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe 36 PID 2732 wrote to memory of 2900 2732 cmd.exe 38 PID 2732 wrote to memory of 2900 2732 cmd.exe 38 PID 2732 wrote to memory of 2900 2732 cmd.exe 38 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe"C:\Users\Admin\AppData\Local\Temp\87b9b910d5d5a053e3b39989cc6fd51601abdaea207a26c765f21f43a4cd4dcb.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2900
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ebfe047c67a2417117d61c8842520c31
SHA1f58cf8c05f16d62e93b9907ff7d50a7a3d607224
SHA25666d838f930938b43b51e90e4066ec28b3099337b4504b6884696d3029a1cbc3b
SHA512e35b5f7e5cf3a64150826c3addee3435120942419ed0aa2cf95ef41850f1238bb300f58a67668102cfc211e116fafec871bbc02364189e25c658384cf3c49565