Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7 -
submitted
26/06/2020, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe
Resource
win7
Behavioral task
behavioral2
Sample
aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe
Resource
win10v200430
General
-
Target
aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe
-
Size
1.1MB
-
MD5
13e623cdfb75d99ea7e04c6157ca8ae6
-
SHA1
f25f0b369a355f30f5e11ac11a7f644bcfefd963
-
SHA256
aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772
-
SHA512
ea6b5c882a5298e527be1f3c40cc6d75c56453dd0111d7e9818c28fa7ec32feb19f17cab9a9e49eb0ab9f3a987f7dcc5cadfea7ae99a996f174b0a89e674f421
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Pn.exe Pn:bin File opened for modification C:\Windows\SysWOW64\Pn.exe attrib.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 608 wrote to memory of 316 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 24 PID 608 wrote to memory of 316 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 24 PID 608 wrote to memory of 316 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 24 PID 608 wrote to memory of 316 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 24 PID 316 wrote to memory of 1460 316 Pn:bin 25 PID 316 wrote to memory of 1460 316 Pn:bin 25 PID 316 wrote to memory of 1460 316 Pn:bin 25 PID 316 wrote to memory of 1460 316 Pn:bin 25 PID 316 wrote to memory of 1680 316 Pn:bin 29 PID 316 wrote to memory of 1680 316 Pn:bin 29 PID 316 wrote to memory of 1680 316 Pn:bin 29 PID 316 wrote to memory of 1680 316 Pn:bin 29 PID 316 wrote to memory of 1816 316 Pn:bin 31 PID 316 wrote to memory of 1816 316 Pn:bin 31 PID 316 wrote to memory of 1816 316 Pn:bin 31 PID 316 wrote to memory of 1816 316 Pn:bin 31 PID 1764 wrote to memory of 1836 1764 Pn.exe 35 PID 1764 wrote to memory of 1836 1764 Pn.exe 35 PID 1764 wrote to memory of 1836 1764 Pn.exe 35 PID 1764 wrote to memory of 1836 1764 Pn.exe 35 PID 1836 wrote to memory of 1632 1836 cmd.exe 37 PID 1836 wrote to memory of 1632 1836 cmd.exe 37 PID 1836 wrote to memory of 1632 1836 cmd.exe 37 PID 1836 wrote to memory of 1632 1836 cmd.exe 37 PID 316 wrote to memory of 1576 316 Pn:bin 38 PID 316 wrote to memory of 1576 316 Pn:bin 38 PID 316 wrote to memory of 1576 316 Pn:bin 38 PID 316 wrote to memory of 1576 316 Pn:bin 38 PID 608 wrote to memory of 1636 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 40 PID 608 wrote to memory of 1636 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 40 PID 608 wrote to memory of 1636 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 40 PID 608 wrote to memory of 1636 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 40 PID 1576 wrote to memory of 1568 1576 cmd.exe 42 PID 1576 wrote to memory of 1568 1576 cmd.exe 42 PID 1576 wrote to memory of 1568 1576 cmd.exe 42 PID 1576 wrote to memory of 1568 1576 cmd.exe 42 PID 1636 wrote to memory of 1620 1636 cmd.exe 43 PID 1636 wrote to memory of 1620 1636 cmd.exe 43 PID 1636 wrote to memory of 1620 1636 cmd.exe 43 PID 1636 wrote to memory of 1620 1636 cmd.exe 43 PID 1836 wrote to memory of 1932 1836 cmd.exe 44 PID 1836 wrote to memory of 1932 1836 cmd.exe 44 PID 1836 wrote to memory of 1932 1836 cmd.exe 44 PID 1836 wrote to memory of 1932 1836 cmd.exe 44 PID 1576 wrote to memory of 1968 1576 cmd.exe 46 PID 1576 wrote to memory of 1968 1576 cmd.exe 46 PID 1576 wrote to memory of 1968 1576 cmd.exe 46 PID 1576 wrote to memory of 1968 1576 cmd.exe 46 PID 1636 wrote to memory of 1896 1636 cmd.exe 45 PID 1636 wrote to memory of 1896 1636 cmd.exe 45 PID 1636 wrote to memory of 1896 1636 cmd.exe 45 PID 1636 wrote to memory of 1896 1636 cmd.exe 45 -
Possible privilege escalation attempt 2 IoCs
pid Process 1680 takeown.exe 1816 icacls.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1460 vssadmin.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Pn:bin aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1680 takeown.exe 1816 icacls.exe -
Loads dropped DLL 2 IoCs
pid Process 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe 608 aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe -
Executes dropped EXE 2 IoCs
pid Process 316 Pn:bin 1764 Pn.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 876 vssvc.exe Token: SeRestorePrivilege 876 vssvc.exe Token: SeAuditPrivilege 876 vssvc.exe -
Deletes itself 1 IoCs
pid Process 1636 cmd.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1968 attrib.exe 1932 attrib.exe 1896 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe"C:\Users\Admin\AppData\Local\Temp\aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe"1⤵
- Suspicious use of WriteProcessMemory
- NTFS ADS
- Loads dropped DLL
PID:608 -
C:\Users\Admin\AppData\Roaming\Pn:binC:\Users\Admin\AppData\Roaming\Pn:bin -r2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:316 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1460
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Pn.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1680
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Pn.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1816
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Pn" & del "C:\Users\Admin\AppData\Roaming\Pn"3⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1568
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Pn"4⤵
- Views/modifies file attributes
PID:1968
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe" & del "C:\Users\Admin\AppData\Local\Temp\aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe"2⤵
- Suspicious use of WriteProcessMemory
- Deletes itself
PID:1636 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1620
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\aa05e7a187ddec2e11fc1c9eafe61408d085b0ab6cd12caeaf531c9dca129772.exe"3⤵
- Views/modifies file attributes
PID:1896
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:876
-
C:\Windows\SysWOW64\Pn.exeC:\Windows\SysWOW64\Pn.exe -s1⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Pn.exe" & del "C:\Windows\SysWOW64\Pn.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1632
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Pn.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1932
-
-