Analysis

  • max time kernel
    148s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    22-06-2020 15:05

General

  • Target

    b8a190a82389771c1862e35fde67018b.exe

  • Size

    344KB

  • MD5

    b8a190a82389771c1862e35fde67018b

  • SHA1

    fabf3ebc2cf571224e9aae55ecad911873a1a983

  • SHA256

    14599971350afb71e8cb46c8bbb082c9e472db578b1ede02ecbc559d777bdfbb

  • SHA512

    73d4c10b3c795f6d185bb96fc8a675089fcf7f0d39fb724cb3493e0da3915d25892862b52c8b3b52f3fbb244c7f7a69d4f5a1b5b042af99c72b6754eb51bc32e

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-2066881839-3229799743-3576549721-1000\{RecOveR}-rihtp__.Txt

Ransom Note
+"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA-4096 https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= It means that on a structural level your files have been transformed . You won't be able to use , read , see or work with them anymore . In other words they are useless , however , there is a possibility to restore them with our help . What exactly happened to your files ??? *** Two personal RSA-4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key , which you received over the web . *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= What should you do next ? There are several options for you to consider : *** You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or *** You can start getting BitCoins right now and get access to your data quite fast . In case you have valuable files , we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions , please access your personal homepage by choosing one of the few addresses down below : http://h3ds4.maconslab.com/33C566F0CC30CCF4 http://aq3ef.goimocoa.at/33C566F0CC30CCF4 http://fl43s.toabolt.at/33C566F0CC30CCF4 If you can't access your personal homepage or the addresses are not working, complete the following steps: *** Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en *** Install TOR Browser and open TOR Browser *** Insert the following link in the address bar: xzjvzkgjxebzreap.onion/33C566F0CC30CCF4 +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= ***************IMPORTANT*****************INFORMATION******************** Your personal homepages http://h3ds4.maconslab.com/33C566F0CC30CCF4 http://aq3ef.goimocoa.at/33C566F0CC30CCF4 http://fl43s.toabolt.at/33C566F0CC30CCF4 Your personal homepage Tor-Browser xzjvzkgjxebzreap.onion/33C566F0CC30CCF4 Your personal ID 33C566F0CC30CCF4 +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-= +"(9*? ?7('.86*)6+5)=54(1%+2'-=
URLs

http://h3ds4.maconslab.com/33C566F0CC30CCF4

http://aq3ef.goimocoa.at/33C566F0CC30CCF4

http://fl43s.toabolt.at/33C566F0CC30CCF4

http://xzjvzkgjxebzreap.onion/33C566F0CC30CCF4

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 97 IoCs
  • Drops file in Program Files directory 13754 IoCs
  • Checks whether UAC is enabled 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1176 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 114 IoCs
  • Program crash 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Drops startup file 6 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies control panel 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8a190a82389771c1862e35fde67018b.exe
    "C:\Users\Admin\AppData\Local\Temp\b8a190a82389771c1862e35fde67018b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Users\Admin\AppData\Roaming\wsmprovhost.exe
      C:\Users\Admin\AppData\Roaming\wsmprovhost.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Modifies registry class
      • System policy modification
      • Drops startup file
      • Adds Run entry to start application
      PID:3800
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3312
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\{RecOveR}-rihtp__.Txt
        3⤵
          PID:3764
        • C:\Windows\System32\wbem\WMIC.exe
          "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 2024
          3⤵
          • Program crash
          PID:3976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 1224
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Program crash
        PID:3216
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\B8A190~1.EXE >> NUL
        2⤵
          PID:1860
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Modifies service
        • Suspicious use of AdjustPrivilegeToken
        PID:3564
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
        1⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Checks whether UAC is enabled
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Modifies Internet Explorer settings
        • Modifies control panel
        PID:3372
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3372 -s 3456
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Program crash
          • Suspicious use of NtCreateProcessExOtherParentProcess
          PID:3136
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
        • Modifies Internet Explorer settings
        PID:1000

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\{RecOveR}-rihtp__.Htm

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\{RecOveR}-rihtp__.Png

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\{RecOveR}-rihtp__.Txt

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\{RecOveR}-rihtp__.Htm

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\{RecOveR}-rihtp__.Png

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\{RecOveR}-rihtp__.Txt

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\{RecOveR}-rihtp__.Htm

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\{RecOveR}-rihtp__.Png

      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\{RecOveR}-rihtp__.Txt

      • C:\Users\Admin\AppData\Roaming\wsmprovhost.exe

      • C:\Users\Admin\AppData\Roaming\wsmprovhost.exe

      • C:\Users\Admin\Desktop\{RecOveR}-rihtp__.Htm

      • C:\Users\Admin\Desktop\{RecOveR}-rihtp__.Txt

      • memory/1032-182-0x0000000000000000-mapping.dmp

      • memory/1860-42-0x0000000000000000-mapping.dmp

      • memory/3136-186-0x0000020928370000-0x0000020928371000-memory.dmp

        Filesize

        4KB

      • memory/3136-189-0x0000020928460000-0x0000020928461000-memory.dmp

        Filesize

        4KB

      • memory/3136-184-0x0000020927570000-0x0000020927571000-memory.dmp

        Filesize

        4KB

      • memory/3136-183-0x0000020927570000-0x0000020927571000-memory.dmp

        Filesize

        4KB

      • memory/3216-29-0x0000000005550000-0x0000000005551000-memory.dmp

        Filesize

        4KB

      • memory/3216-3-0x0000000004E10000-0x0000000004E11000-memory.dmp

        Filesize

        4KB

      • memory/3312-7-0x0000000000000000-mapping.dmp

      • memory/3764-171-0x0000000000000000-mapping.dmp

      • memory/3800-30-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-6-0x0000000003690000-0x0000000003691000-memory.dmp

        Filesize

        4KB

      • memory/3800-138-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-144-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-158-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-131-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-128-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-124-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-115-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-113-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-105-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-85-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-60-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-0-0x0000000000000000-mapping.dmp

      • memory/3800-28-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-13-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-10-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-9-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-8-0x0000000003690000-0x0000000003691000-memory.dmp

        Filesize

        4KB

      • memory/3800-132-0x0000000003790000-0x0000000003791000-memory.dmp

        Filesize

        4KB

      • memory/3800-4-0x00000000036B0000-0x00000000036B1000-memory.dmp

        Filesize

        4KB

      • memory/3800-5-0x0000000003EB0000-0x0000000003EB1000-memory.dmp

        Filesize

        4KB

      • memory/3800-217-0x0000000000000000-mapping.dmp

      • memory/3800-204-0x0000000000000000-mapping.dmp

      • memory/3800-203-0x0000000000000000-mapping.dmp

      • memory/3800-205-0x0000000000000000-mapping.dmp

      • memory/3800-206-0x0000000000000000-mapping.dmp

      • memory/3800-207-0x0000000000000000-mapping.dmp

      • memory/3800-208-0x0000000000000000-mapping.dmp

      • memory/3800-209-0x0000000000000000-mapping.dmp

      • memory/3800-210-0x0000000000000000-mapping.dmp

      • memory/3800-211-0x0000000000000000-mapping.dmp

      • memory/3800-212-0x0000000000000000-mapping.dmp

      • memory/3800-213-0x0000000000000000-mapping.dmp

      • memory/3800-214-0x0000000000000000-mapping.dmp

      • memory/3800-215-0x0000000000000000-mapping.dmp

      • memory/3800-216-0x0000000000000000-mapping.dmp

      • memory/3976-202-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

        Filesize

        4KB

      • memory/3976-219-0x0000000005520000-0x0000000005521000-memory.dmp

        Filesize

        4KB