Managed XDR
Group-IB MDP Report
File info
Filename: 1e7c0f7091e8ed3687b06556cbbda638af99e35d372ba257cedb8ada4b2c43fe.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 313 KB
Env info
win7/x86 en
Hashes
SHA1: a5f154836057df5c765c5c4a37fd239c850a1ccc
SHA256: 1e7c0f7091e8ed3687b06556cbbda638af99e35d372ba257cedb8ada4b2c43fe
MD5: 301ee665db2c4f3b0d70cebf0125939b
Malwares
Conti
Buran
Signatures
Execution
T1047 has_wmi: Executes one or several WMI requests
Persistence
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
Privilege Escalation
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1027.002 pe_features: Executable file has PE anomalies (may be false positive)
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1497 evasion_prefetch: Attempts to detect Sandbox by process run count
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1480 system_default_lang_id_present: Checks the system language
Credential Access
T1552.001 infostealer_bitcoin: Attempts to obtain access to Bitcoin/ALTCoin wallets
T1552 infostealer_mail: Collects personal data from local email clients
T1555.003 cookie_files: Accesses cookie files
T1552 cookie_files: Accesses cookie files
Discovery
T1057 process_interest: Enumerates processes
T1083 crawls_directories: Opens a huge number of directories all over disk C: (possibly, searches for sensitive data)
T1518 locates_browser: Attempts to identify where browsers are installed
T1497 evasion_prefetch: Attempts to detect Sandbox by process run count
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1135 server_share_info: Retrieves information about each shared resource on a server
Collection
T1114 infostealer_mail: Collects personal data from local email clients
T1074.001 access_recyclebin: Manipulation with recyclebin detected
Impact
T1486 modifies_files2: Cryptolocker indicators detected (500 or more files are modified)
T1486 modifies_files: Cryptolocker indicators detected (renamed 500 or more files)
T1486 ransomware_windows_possible: Ransomware indicators detected (possible ransom window creation)
T1486 ransomware_extensions: Ransomware(s) Buran, Conti indicators detected (specific extension is added to files)
T1490 vssadmin_delete_shadows: Attempt to delete volume shadow copies
T1486 mass_data_encryption: Encrypts data using the same key (possible ransomware behaviour)
T1489 service_control_stop: Stops services via ControlService
Other
yara_rules: Static rules
ransomware_shadowcopy: Removes volume shadow copies
creates_in_windows: Creates files in the Windows directory
cryptolocker_wallpaper: Ransomware indicators detected (changes the desktop wallpaper file)
process_crashed: One of the processes has failed
unexpected_exception: Unexpected exception
create_rpc_bindings: Creates RPC connection
creates_in_programdata: Creates files in the ProgramData directory
test_check_service: Starts services
writes_data: Writes big amount of data to disk
Managed XDR