Edit tour
Windows
Analysis Report
malware.exe
Overview
General Information
Detection
Targeted Ransomware, TrojanRansom
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Found ransom note / readme
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RansomwareGeneric
Yara detected Targeted Ransomware
Yara detected TrojanRansom
AI detected suspicious sample
Creates files in the recycle bin to hide itself
Deletes shadow drive data (may be related to ransomware)
Machine Learning detection for sample
May disable shadow drive data (uses vssadmin)
Opens network shares
Sigma detected: Shadow Copies Deletion Using Operating Systems Utilities
Sigma detected: Suspicious Epmap Connection
Uses bcdedit to modify the Windows boot settings
Writes a notice file (html or txt) to demand a ransom
Writes many files with high entropy
Abnormal high CPU Usage
Checks for available system drives (often done to infect USB drives)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Stores files to the Windows start menu directory
Uses 32bit PE files
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- malware.exe (PID: 6904 cmdline:
"C:\Users\ user\Deskt op\malware .exe" MD5: 99BFAAACEBF1B34FDEBD4E7CE4070A36) - cmd.exe (PID: 4544 cmdline:
"C:\Window s\System32 \cmd.exe" /c bcdedit /set {cur rent} boot statuspoli cy ignorea llfailures MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5932 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - vssadmin.exe (PID: 6256 cmdline:
"C:\Window s\sysnativ e\vssadmin .exe" dele te shadows /all /qui et MD5: B58073DB8892B67A672906C9358020EC) - conhost.exe (PID: 648 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6280 cmdline:
"C:\Window s\System32 \cmd.exe" /C sc dele te "MSSQLF DLauncher" &&sc delet e "MSSQLSE RVER"&&sc delete "SQ LSERVERAGE NT"&&sc de lete "SQLB rowser"&&s c delete " SQLTELEMET RY"&&sc de lete "MsDt sServer130 "&&sc dele te "SSISTE LEMETRY130 "&&sc dele te "SQLWri ter"&&sc d elete "MSS QL$VEEAMSQ L2012"&&sc delete "S QLAgent$VE EAMSQL2012 "&&sc dele te "MSSQL" &&sc delet e "SQLAgen t"&&sc del ete "MSSQL ServerADHe lper100"&& sc delete "MSSQLServ erOLAPServ ice"&&sc d elete "MsD tsServer10 0"&&sc del ete "Repor tServer"&& sc delete "SQLTELEME TRY$HL"&&s c delete " TMBMServer "&&sc dele te "MSSQL$ PROGID"&&s c delete " MSSQL$WOLT ERSKLUWER" &&sc delet e "SQLAgen t$PROGID"& &sc delete "SQLAgent $WOLTERSKL UWER"&&sc delete "MS SQLFDLaunc her$OPTIMA "&&sc dele te "MSSQL$ OPTIMA"&&s c delete " SQLAgent$O PTIMA"&&sc delete "R eportServe r$OPTIMA"& &sc delete "msftesql $SQLEXPRES S"&&sc del ete "postg resql-x64- 9.4"&&rem Kill "SQL" &&taskkill -f -im sq lbrowser.e xe&&taskki ll -f -im sqlwriter. exe&&taskk ill -f -im sqlservr. exe&&taskk ill -f -im msmdsrv.e xe&&taskki ll -f -im MsDtsSrvr. exe&&taskk ill -f -im sqlceip.e xe&&taskki ll -f -im fdlauncher .exe&&task kill -f -i m Ssms.exe &&taskkill -f -im SQ LAGENT.EXE &&taskkill -f -im fd host.exe&& taskkill - f -im fdla uncher.exe &&taskkill -f -im sq lservr.exe &&taskkill -f -im Re portingSer vicesServi ce.exe&&ta skkill -f -im msftes ql.exe&&ta skkill -f -im pg_ctl .exe&&task kill -f -i m postgres .exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6284 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 2056 cmdline:
sc delete "MSSQLFDLa uncher" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - cmd.exe (PID: 4600 cmdline:
"C:\Window s\System32 \cmd.exe" /c bcdedit /set {cur rent} reco veryenable d no MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- notepad.exe (PID: 4456 cmdline:
"C:\Window s\system32 \NOTEPAD.E XE" C:\Use rs\user\Ap pData\Roam ing\Micros oft\Window s\Start Me nu\Program s\Startup\ FILE RECOV ERY.txt MD5: 27F71B12CB585541885A31BE22F61C83)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Ransomware_Generic | Yara detected Ransomware_Generic | Joe Security | ||
JoeSecurity_TargetedRansomware | Yara detected Targeted Ransomware | Joe Security | ||
JoeSecurity_TrojanRansom | Yara detected TrojanRansom | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Michael Haag, Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community, Andreas Hunkeler (@Karneades): |
Source: | Author: frack113, Tim Shelton (fps): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-07T12:40:59.562832+0100 | 2046826 | 1 | A Network Trojan was detected | 192.168.2.4 | 55579 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-07T12:41:01.288018+0100 | 2046827 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:03.154741+0100 | 2046827 | 1 | A Network Trojan was detected | 192.168.2.4 | 49734 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:05.039651+0100 | 2046827 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:07.058485+0100 | 2046827 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:12.534758+0100 | 2046827 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:14.330007+0100 | 2046827 | 1 | A Network Trojan was detected | 192.168.2.4 | 49742 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:16.128235+0100 | 2046827 | 1 | A Network Trojan was detected | 192.168.2.4 | 49744 | 13.248.169.48 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-07T12:41:01.724541+0100 | 2039815 | 1 | A Network Trojan was detected | 192.168.2.4 | 49733 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:03.633622+0100 | 2039815 | 1 | A Network Trojan was detected | 192.168.2.4 | 49734 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:05.586290+0100 | 2039815 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:07.506995+0100 | 2039815 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:12.977306+0100 | 2039815 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:14.771895+0100 | 2039815 | 1 | A Network Trojan was detected | 192.168.2.4 | 49742 | 13.248.169.48 | 443 | TCP |
2024-12-07T12:41:16.568045+0100 | 2039815 | 1 | A Network Trojan was detected | 192.168.2.4 | 49744 | 13.248.169.48 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |