Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows7_x64 -
resource
win7 -
submitted
26/06/2020, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win7
Behavioral task
behavioral2
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win10v200430
General
-
Target
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
-
Size
1.0MB
-
MD5
572fea5f025df78f2d316216fbeee52e
-
SHA1
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
-
SHA256
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
-
SHA512
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1688 Wmi:bin 2016 Wmi.exe -
Deletes itself 1 IoCs
pid Process 1568 cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Wmi:bin 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1776 vssadmin.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Wmi.exe Wmi:bin File opened for modification C:\Windows\SysWOW64\Wmi.exe attrib.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1976 takeown.exe 1996 icacls.exe -
Loads dropped DLL 2 IoCs
pid Process 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1688 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 24 PID 1516 wrote to memory of 1688 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 24 PID 1516 wrote to memory of 1688 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 24 PID 1516 wrote to memory of 1688 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 24 PID 1688 wrote to memory of 1776 1688 Wmi:bin 25 PID 1688 wrote to memory of 1776 1688 Wmi:bin 25 PID 1688 wrote to memory of 1776 1688 Wmi:bin 25 PID 1688 wrote to memory of 1776 1688 Wmi:bin 25 PID 1688 wrote to memory of 1976 1688 Wmi:bin 29 PID 1688 wrote to memory of 1976 1688 Wmi:bin 29 PID 1688 wrote to memory of 1976 1688 Wmi:bin 29 PID 1688 wrote to memory of 1976 1688 Wmi:bin 29 PID 1688 wrote to memory of 1996 1688 Wmi:bin 31 PID 1688 wrote to memory of 1996 1688 Wmi:bin 31 PID 1688 wrote to memory of 1996 1688 Wmi:bin 31 PID 1688 wrote to memory of 1996 1688 Wmi:bin 31 PID 2016 wrote to memory of 1676 2016 Wmi.exe 35 PID 2016 wrote to memory of 1676 2016 Wmi.exe 35 PID 2016 wrote to memory of 1676 2016 Wmi.exe 35 PID 2016 wrote to memory of 1676 2016 Wmi.exe 35 PID 1676 wrote to memory of 1580 1676 cmd.exe 37 PID 1676 wrote to memory of 1580 1676 cmd.exe 37 PID 1676 wrote to memory of 1580 1676 cmd.exe 37 PID 1676 wrote to memory of 1580 1676 cmd.exe 37 PID 1688 wrote to memory of 1628 1688 Wmi:bin 38 PID 1688 wrote to memory of 1628 1688 Wmi:bin 38 PID 1688 wrote to memory of 1628 1688 Wmi:bin 38 PID 1688 wrote to memory of 1628 1688 Wmi:bin 38 PID 1516 wrote to memory of 1568 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 40 PID 1516 wrote to memory of 1568 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 40 PID 1516 wrote to memory of 1568 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 40 PID 1516 wrote to memory of 1568 1516 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 40 PID 1628 wrote to memory of 1412 1628 cmd.exe 42 PID 1628 wrote to memory of 1412 1628 cmd.exe 42 PID 1628 wrote to memory of 1412 1628 cmd.exe 42 PID 1628 wrote to memory of 1412 1628 cmd.exe 42 PID 1568 wrote to memory of 1228 1568 cmd.exe 43 PID 1568 wrote to memory of 1228 1568 cmd.exe 43 PID 1568 wrote to memory of 1228 1568 cmd.exe 43 PID 1568 wrote to memory of 1228 1568 cmd.exe 43 PID 1676 wrote to memory of 1140 1676 cmd.exe 44 PID 1676 wrote to memory of 1140 1676 cmd.exe 44 PID 1676 wrote to memory of 1140 1676 cmd.exe 44 PID 1676 wrote to memory of 1140 1676 cmd.exe 44 PID 1628 wrote to memory of 852 1628 cmd.exe 45 PID 1628 wrote to memory of 852 1628 cmd.exe 45 PID 1628 wrote to memory of 852 1628 cmd.exe 45 PID 1628 wrote to memory of 852 1628 cmd.exe 45 PID 1568 wrote to memory of 1504 1568 cmd.exe 46 PID 1568 wrote to memory of 1504 1568 cmd.exe 46 PID 1568 wrote to memory of 1504 1568 cmd.exe 46 PID 1568 wrote to memory of 1504 1568 cmd.exe 46 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1860 vssvc.exe Token: SeRestorePrivilege 1860 vssvc.exe Token: SeAuditPrivilege 1860 vssvc.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1140 attrib.exe 852 attrib.exe 1504 attrib.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Possible privilege escalation attempt 2 IoCs
pid Process 1996 icacls.exe 1976 takeown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"1⤵
- NTFS ADS
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\Wmi:binC:\Users\Admin\AppData\Roaming\Wmi:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1776
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Wmi.exe3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1976
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Wmi.exe /reset3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1996
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Wmi" & del "C:\Users\Admin\AppData\Roaming\Wmi"3⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1412
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Wmi"4⤵
- Views/modifies file attributes
PID:852
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe" & del "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1228
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"3⤵
- Views/modifies file attributes
PID:1504
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
C:\Windows\SysWOW64\Wmi.exeC:\Windows\SysWOW64\Wmi.exe -s1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Wmi.exe" & del "C:\Windows\SysWOW64\Wmi.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1580
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Wmi.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1140
-
-