Analysis

  • max time kernel
    119s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    09-07-2020 17:18

General

  • Target

    460a1s0ssssd7da.exe

  • Size

    717KB

  • MD5

    a8569bc863ee5c29671bbac230ee8d90

  • SHA1

    ece5c2505319d3abe8bb081f325c4a42f61dd6db

  • SHA256

    c35b8114cf20d7683905224a84263fdff99577ce69a1b1a94e66f525c38f31ce

  • SHA512

    5a510640357931044bc471cd5664b91869ba405682d7847e9fb7081a865ccd6b9a37bb022e5c92e9616002029ae9c29a46aec7ff0e9d14160ce758146c717205

Score
10/10

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?QQQQQQQQ 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?QQQQQQQQ

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs
  • Drops file in Program Files directory 12093 IoCs
  • Drops desktop.ini file(s) 40 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4510 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\460a1s0ssssd7da.exe
    "C:\Users\Admin\AppData\Local\Temp\460a1s0ssssd7da.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1436
    • C:\Users\Admin\AppData\Local\Temp\460a1s0ssssd7da.exe
      "{path}"
      2⤵
      • Drops startup file
      • Drops file in Program Files directory
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      PID:1672
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
      PID:568

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1672-0-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/1672-1-0x0000000000407CA0-mapping.dmp
    • memory/1672-2-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB