Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    04-07-2020 15:21

General

  • Target

    194270766c8afe4cdd99c8f1ebdbc18321bd79ac6f2f3e0c0638ea93ffe8aaf6.exe

  • Size

    2.0MB

  • MD5

    13ee6ed04ada2524eabdf26bcc4849fe

  • SHA1

    ea5aa317603aea0a39972f521792edc62d941fbc

  • SHA256

    194270766c8afe4cdd99c8f1ebdbc18321bd79ac6f2f3e0c0638ea93ffe8aaf6

  • SHA512

    8fd889ffc305e39702c7f2c2b798dfc5c0ea29ce9c39268321ad2917e8a90ee373862bff12bb6613f4ba3a2becc9236534f53a7aba85c248363aa419dc902920

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\READ_ME_Heyyyyyyy.txt

Ransom Note
All your files have been encrypted! All your documents (databases, texts, images, videos, musics etc.) were encrypted. The encryption was done using a secret keythat is now on our servers. To decrypt your files you will need to buy the secret key from us. We are the only on the world who can provide this for you. What can I do? Pay the ransom, in bitcoins, in the amount and wallet below. You can use www.coindirect.com/de - coinbase.com - coinmama.com - LocalBitcoins.com to buy bitcoins. 0,036 Bitcoin = 300 EURO Send BTC Address = 1NxoWvpXufC5PkagnfWD9Rf19wm5jchVkX
Wallets

1NxoWvpXufC5PkagnfWD9Rf19wm5jchVkX

Signatures

  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\194270766c8afe4cdd99c8f1ebdbc18321bd79ac6f2f3e0c0638ea93ffe8aaf6.exe
    "C:\Users\Admin\AppData\Local\Temp\194270766c8afe4cdd99c8f1ebdbc18321bd79ac6f2f3e0c0638ea93ffe8aaf6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe
      C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\xX.exe
        "C:\Users\Admin\AppData\Local\Temp\xX.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Modifies system certificate store
        • Sets desktop wallpaper using registry
        PID:1496
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C timeout 2 && Del /Q /F C:\Users\Admin\AppData\Local\Temp\xX.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1904
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            5⤵
            • Delays execution with timeout.exe
            PID:1948
      • C:\Users\Admin\AppData\Local\Temp\xc.exe
        "C:\Users\Admin\AppData\Local\Temp\xc.exe"
        3⤵
        • Adds Run entry to start application
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        PID:1616

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe
  • C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe
  • C:\Users\Admin\AppData\Local\Temp\xX.exe
  • C:\Users\Admin\AppData\Local\Temp\xX.exe
  • C:\Users\Admin\AppData\Local\Temp\xc.exe
  • C:\Users\Admin\AppData\Local\Temp\xc.exe
  • \Users\Admin\AppData\Local\Temp\XVlBzgbaiC.exe
  • memory/1308-1-0x0000000000000000-mapping.dmp
  • memory/1496-4-0x0000000000000000-mapping.dmp
  • memory/1616-6-0x0000000000000000-mapping.dmp
  • memory/1904-15-0x0000000000000000-mapping.dmp
  • memory/1948-20-0x0000000000000000-mapping.dmp