Analysis

  • max time kernel
    119s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    09-07-2020 17:15

General

  • Target

    403a1s0ssssd7da.exe

  • Size

    717KB

  • MD5

    b7409b7d45794e78aeaeb8b8b0dcac74

  • SHA1

    a800da4d4a34db9ae4435ebff81fcf7dcae808fc

  • SHA256

    f9397a0438f1e3a8d03aa326dc4910482df49dd295228d9a4dda1f55247fd6e3

  • SHA512

    2c5e6a560d4b3721404e99617c69c5e7f194040563167662b9269f5c6229a3257a38b6c2cddf6bc79dd7c10a7f506225c6e034fee178a8d9965a4ba222a56783

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?AAAAAAAA 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?AAAAAAAA

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Suspicious use of WriteProcessMemory 10 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Drops file in Program Files directory 12089 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 41 IoCs
  • Suspicious use of FindShellTrayWindow 96 IoCs
  • Suspicious use of SendNotifyMessage 112 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Enumerates connected drives 3 TTPs
  • Suspicious behavior: EnumeratesProcesses 4528 IoCs
  • Modifies registry class 20 IoCs
  • Modifies service 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\403a1s0ssssd7da.exe
    "C:\Users\Admin\AppData\Local\Temp\403a1s0ssssd7da.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1156
    • C:\Users\Admin\AppData\Local\Temp\403a1s0ssssd7da.exe
      "{path}"
      2⤵
      • Drops file in Program Files directory
      • Drops startup file
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      PID:1508
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Suspicious use of AdjustPrivilegeToken
    • Drops desktop.ini file(s)
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Modifies registry class
    • Modifies service
    PID:1952
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Modifies registry class
    PID:592
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious behavior: GetForegroundWindowSpam
    • Modifies registry class
    • Modifies service
    PID:1320
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Suspicious use of AdjustPrivilegeToken
    • Modifies registry class
    • Modifies service
    PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1216-8-0x00000000036F0000-0x00000000036F1000-memory.dmp

    Filesize

    4KB

  • memory/1216-7-0x00000000036F0000-0x00000000036F1000-memory.dmp

    Filesize

    4KB

  • memory/1216-6-0x00000000036F0000-0x00000000036F1000-memory.dmp

    Filesize

    4KB

  • memory/1508-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1508-2-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1952-3-0x0000000003AA0000-0x0000000003AA1000-memory.dmp

    Filesize

    4KB