Analysis

  • max time kernel
    151s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    26-06-2020 19:16

General

  • Target

    Pastebin Malware.txt.ps1

  • Size

    909KB

  • MD5

    014669d29b044feda91dcb8ad200c853

  • SHA1

    ffa6583c4bbcb28999f66b90a5d5276fb145fae3

  • SHA256

    ac8ccb4e061660998bc269d9b94f95dade11a4fe09a4457f5155ead8bfa74680

  • SHA512

    c66c818b8c3747aae473ec1dc68da1f360b889901cf0a528e0fc50a513c5c66bc8e84a0a2f72db4f0280a52b5ffba5691f50113ddf6d48098e8b75d7b5f7f340

Malware Config

Extracted

Path

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\5E41A8-Readme.txt

Family

mailto_hamlampampom

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .5e41a8 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_5e41a8: FkBNo6YyEKIpxRpt1QzYAte/n/oYDUtIGqaMuHAM7v7zIGLok+ t5RcK0tP+txlxpXQIjvyMcKLXCliAiFddYuuiYTkd1taI9DDvF yDWBo3nHpM/nSDm7sDuvEqLQNx+JFEL389p2ABT6wdGPQfoQTM GZUxPpc1WUU5L7G9o8nl4VG0y4AwitOvChIsrVB2WRxMP6QRTp B2Yuns36xO+A7teQc9CcDvR2M5E/LPYd87lVKz0rEVv4e28RBy NdrTaLLULpkQmlMnRasBPmcBVAipzq/O7qM3qBig==}

Extracted

Path

C:\Program Files\5E41A8-Readme.txt

Family

mailto_hamlampampom

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .5e41a8 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_5e41a8: FkBNo6YyEKIpxRpt1QzYAte/n/oYDUtIGqaMuHAM7v7zIGLok+ t5RcK0tP+txlxpXQIjvyMcKLXCliAiFddYuuiYTkd1taI9DDvF yDWBo3nHpM/nSDm7sDuvEqLQNx+JFEL389p2ABT6wdGPQfoQTM GZUxPpc1WUU5L7G9o8nl4VG0y4AwitOvChIsrVB2WRxMP6QRTp B2Yuns36xO+A7teQc9CcDvR2M5E/LPYd87lVKz0rEVv4e28RBy NdrTaLLULpkQmlMnRasBPmcBVAipzq/O7qM3qBig==}Hi! Your files are encrypted. All encrypted files for this computer has extension: .5e41a8 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_5e41a8: FkBNo6YyEKIpxRpt1QzYAte/n/oYDUtIGqaMuHAM7v7zIGLok+ t5RcK0tP+txlxpXQIjvyMcKLXCliAiFddYuuiYTkd1taI9DDvF yDWBo3nHpM/nSDm7sDuvEqLQNx+JFEL389p2ABT6wdGPQfoQTM GZUxPpc1WUU5L7G9o8nl4VG0y4AwitOvChIsrVB2WRxMP6QRTp B2Yuns36xO+A7teQc9CcDvR2M5E/LPYd87lVKz0rEVv4e28RBy NdrTaLLULpkQmlMnRasBPmcBVAipzq/O7qM3qBig==}Hi! Your files are encrypted. All encrypted files for this computer has extension: .5e41a8 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_5e41a8: FkBNo6YyEKIpxRpt1QzYAte/n/oYDUtIGqaMuHAM7v7zIGLok+ t5RcK0tP+txlxpXQIjvyMcKLXCliAiFddYuuiYTkd1taI9DDvF yDWBo3nHpM/nSDm7sDuvEqLQNx+JFEL389p2ABT6wdGPQfoQTM GZUxPpc1WUU5L7G9o8nl4VG0y4AwitOvChIsrVB2WRxMP6QRTp B2Yuns36xO+A7teQc9CcDvR2M5E/LPYd87lVKz0rEVv4e28RBy NdrTaLLULpkQmlMnRasBPmcBVAipzq/O7qM3qBig==}

Signatures

  • Suspicious use of WriteProcessMemory 16 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 7475 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 22207 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • MailTo (Hamlampampom Variant)

    Ransomware family discovered in late 2019 with variants named based on contact emails.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of FindShellTrayWindow
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SendNotifyMessage
    • Checks whether UAC is enabled
    PID:1296
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\Pastebin Malware.txt.ps1"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:828
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\01wfc1q2\01wfc1q2.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC273.tmp" "c:\Users\Admin\AppData\Local\Temp\01wfc1q2\CSCD854499974F04325AFFC101AF513FCF7.TMP"
          4⤵
            PID:1600
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hl4ako2b\hl4ako2b.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC32F.tmp" "c:\Users\Admin\AppData\Local\Temp\hl4ako2b\CSCF2893487420C4C02B6E3F1C5A8639BED.TMP"
            4⤵
              PID:1076
        • C:\Windows\system32\notepad.exe
          C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\5E41A8-Readme.txt"
          2⤵
            PID:6104
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Modifies service
          • Suspicious use of AdjustPrivilegeToken
          PID:1764

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\01wfc1q2\01wfc1q2.dll

        • C:\Users\Admin\AppData\Local\Temp\RESC273.tmp

        • C:\Users\Admin\AppData\Local\Temp\RESC32F.tmp

        • C:\Users\Admin\AppData\Local\Temp\hl4ako2b\hl4ako2b.dll

        • C:\Users\Admin\Desktop\5E41A8-Readme.txt

        • \??\c:\Users\Admin\AppData\Local\Temp\01wfc1q2\01wfc1q2.0.cs

        • \??\c:\Users\Admin\AppData\Local\Temp\01wfc1q2\01wfc1q2.cmdline

        • \??\c:\Users\Admin\AppData\Local\Temp\01wfc1q2\CSCD854499974F04325AFFC101AF513FCF7.TMP

        • \??\c:\Users\Admin\AppData\Local\Temp\hl4ako2b\CSCF2893487420C4C02B6E3F1C5A8639BED.TMP

        • \??\c:\Users\Admin\AppData\Local\Temp\hl4ako2b\hl4ako2b.0.cs

        • \??\c:\Users\Admin\AppData\Local\Temp\hl4ako2b\hl4ako2b.cmdline

        • memory/748-7-0x0000000000000000-mapping.dmp

        • memory/828-15-0x00000000026C0000-0x00000000026E2000-memory.dmp

          Filesize

          136KB

        • memory/828-14-0x00000000026C0000-0x00000000026E2000-memory.dmp

          Filesize

          136KB

        • memory/828-16-0x00000000026C0000-0x00000000026E2000-memory.dmp

          Filesize

          136KB

        • memory/828-17-0x00000000026C0000-0x00000000026E2000-memory.dmp

          Filesize

          136KB

        • memory/828-18-0x00000000026C0000-0x00000000026E2000-memory.dmp

          Filesize

          136KB

        • memory/828-19-0x00000000026C0000-0x00000000026E2000-memory.dmp

          Filesize

          136KB

        • memory/828-20-0x00000000026C0000-0x00000000026E2000-memory.dmp

          Filesize

          136KB

        • memory/856-0-0x0000000000000000-mapping.dmp

        • memory/1076-10-0x0000000000000000-mapping.dmp

        • memory/1600-3-0x0000000000000000-mapping.dmp

        • memory/6104-22-0x0000000000000000-mapping.dmp