Analysis

  • max time kernel
    107s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7v200410
  • submitted
    27-04-2020 12:18

General

  • Target

    ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1.exe

  • Size

    211KB

  • MD5

    32ed52d918a138ddad24dd3a84e20e56

  • SHA1

    11f455b32e8473353febc5995cef63497c5404a1

  • SHA256

    ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1

  • SHA512

    13e49bb04813598ef5ab1e40a0a657091182bf8ec7b9d4a24bb6d162bfc01b232c910e6e85fdefc13dcded49438e5e6d996ca21a13ec2cd7a0d5f5a40c16a446

Malware Config

Extracted

Path

C:\How_To_Decrypt_My_Files.txt

Family

ragnarok

Ransom Note
#what happend? Unfortunately your files are encrypted, To decrypt your files follow the instructions 1. you need a decrypt tool so that you can decrypt all of your files 2. contact with us for our btc address if you want decrypt your files or you can do nothing just wait your files gona be deleted 3. you can provide a file which size less than 3M for us to prove that we can decrypt your files after you paid 4. it is wise to pay in the first time it wont cause you more losses you can send your DEVICE ID to mail address below ragnarok_master@protonmail.com ragnarok@rape.lol yawkyawkyawk@cock.li DEVICE ID: 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
Emails

ragnarok_master@protonmail.com

ragnarok@rape.lol

yawkyawkyawk@cock.li

Signatures

  • Suspicious use of WriteProcessMemory 16 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Drops desktop.ini file(s) 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Modifies service 2 TTPs 10 IoCs
  • Makes http(s) request 2 IoCs

    Contacts server via http/https, possibly for C2 communication.

  • Ragnarok

    Ransomware family deployed from Citrix servers infected via CVE-2019-19781.

  • Modifies Windows Firewall 1 TTPs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1.exe
    "C:\Users\Admin\AppData\Local\Temp\ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Drops desktop.ini file(s)
    PID:2024
    • C:\Windows\system32\cmd.exe
      cmd.exe /c vssadmin delete shadows /all /quiet
      2⤵
        PID:2032
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          3⤵
          • Interacts with shadow copies
          PID:1472
      • C:\Windows\system32\cmd.exe
        cmd.exe /c bcdedit /set {current} bootstatuspolicy ignoreallfailures
        2⤵
          PID:2040
          • C:\Windows\system32\bcdedit.exe
            bcdedit /set {current} bootstatuspolicy ignoreallfailures
            3⤵
            • Modifies boot configuration data using bcdedit
            PID:1504
        • C:\Windows\system32\cmd.exe
          cmd.exe /c bcdedit /set {current} recoveryenabled no
          2⤵
            PID:1040
            • C:\Windows\system32\bcdedit.exe
              bcdedit /set {current} recoveryenabled no
              3⤵
              • Modifies boot configuration data using bcdedit
              PID:1544
          • C:\Windows\system32\cmd.exe
            cmd.exe /c netsh advfirewall set allprofiles state off
            2⤵
              PID:1068
              • C:\Windows\system32\netsh.exe
                netsh advfirewall set allprofiles state off
                3⤵
                • Modifies service
                PID:1424
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            • Modifies service
            PID:364

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Modify Existing Service

          2
          T1031

          Defense Evasion

          File Deletion

          2
          T1107

          Modify Registry

          1
          T1112

          Impact

          Inhibit System Recovery

          3
          T1490

          Replay Monitor

          Loading Replay Monitor...

          Downloads