Analysis

  • max time kernel
    60s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    09-07-2020 17:18

General

  • Target

    460a1s0ssssd7da.exe

  • Size

    717KB

  • MD5

    a8569bc863ee5c29671bbac230ee8d90

  • SHA1

    ece5c2505319d3abe8bb081f325c4a42f61dd6db

  • SHA256

    c35b8114cf20d7683905224a84263fdff99577ce69a1b1a94e66f525c38f31ce

  • SHA512

    5a510640357931044bc471cd5664b91869ba405682d7847e9fb7081a865ccd6b9a37bb022e5c92e9616002029ae9c29a46aec7ff0e9d14160ce758146c717205

Score
10/10

Malware Config

Extracted

Path

\??\M:\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?CUVXYACD 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?CUVXYACD

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Suspicious use of WriteProcessMemory 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4306 IoCs
  • Drops file in Program Files directory 9016 IoCs
  • Drops desktop.ini file(s) 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\460a1s0ssssd7da.exe
    "C:\Users\Admin\AppData\Local\Temp\460a1s0ssssd7da.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\460a1s0ssssd7da.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Drops file in Program Files directory
      • Drops desktop.ini file(s)
      PID:3812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3812-1-0x0000000000407CA0-mapping.dmp
  • memory/3812-0-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/3812-2-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB