Resubmissions

11/05/2020, 15:26

200511-xt1564wyhj 10

05/05/2020, 23:59

200505-rl298pza1a 10

Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    11/05/2020, 15:26

General

  • Target

    go.exe

  • Size

    2.5MB

  • MD5

    f7508239b937b2427649be8f77718f60

  • SHA1

    ae85ece228d81f1b4cc8203bab4a8a2e45c2dc05

  • SHA256

    fa7465ff52d0725c0ce446ca4f1686a3912c5117e7e37d87c5c4c013ec629599

  • SHA512

    005a8cb1408d1049cf7926309bc7bf17689588b8804defd99dbfced6c36795faab4559320dc71d59f5259c7858bdb032d88c83c56f6cde2e9d9f0d28f8f1a66f

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\LEEME.txt

Family

hackransom

Ransom Note
Todos tus archivos han sido encriptados con un Ransomware. No te preocupes que no has perdido tus archivos aun. Solicita la clave de descifrado a la persona que te suministro este archivo. .

Signatures

  • Drops file in Windows directory 1 IoCs
  • HaCk Ransomware

    GoLang ransomware which targets Spanish users.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 IoCs
  • Modifies registry class 114 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Modifies control panel 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\go.exe
    "C:\Users\Admin\AppData\Local\Temp\go.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler https://google.com/
      2⤵
        PID:1808
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler C:\Users\Admin/Desktop/LEEME.txt
        2⤵
        • Suspicious use of WriteProcessMemory
        • Modifies registry class
        PID:3132
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\LEEME.txt
          3⤵
          • Opens file in notepad (likely ransom note)
          PID:3032
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Checks whether UAC is enabled
      • Modifies registry class
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Modifies control panel
      PID:2244
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2244 -s 3520
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of NtCreateProcessExOtherParentProcess
        PID:3792
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:984

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3792-1-0x00000214ABA90000-0x00000214ABA91000-memory.dmp

      Filesize

      4KB

    • memory/3792-2-0x00000214ABA90000-0x00000214ABA91000-memory.dmp

      Filesize

      4KB

    • memory/3792-4-0x00000214AC8E0000-0x00000214AC8E1000-memory.dmp

      Filesize

      4KB

    • memory/3792-7-0x00000214ACCE0000-0x00000214ACCE1000-memory.dmp

      Filesize

      4KB

    • memory/3792-9-0x00000214AC9E0000-0x00000214AC9E1000-memory.dmp

      Filesize

      4KB