Analysis

  • max time kernel
    98s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    09-07-2020 17:16

General

  • Target

    703a1s0ssssd7da.exe

  • Size

    717KB

  • MD5

    83f6e8129fd4917311956264f46971f0

  • SHA1

    183757c527e8f213be0c1397f40b6cd3979c854c

  • SHA256

    a7add0057b62fd19144486d1933b3a68331aebab989192d3f32e5c85f07b8590

  • SHA512

    1a31f54a50f6d09765ca1be1c39ac1d6a200e8564926155eab7249407e48029aba312976ccc09328679cf9b0629f7af0448af98ecea6ee0c3c68fc24905bb7d8

Score
10/10

Malware Config

Extracted

Path

\??\M:\Read_Me.txt

Ransom Note
Attention! All your files, documents, photos, databases and other important files are encrypted The only method of recovering files is to purchase an unique decryptor. Only we can give you this decryptor and only we can recover your files. The server with your decryptor is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- 1. Download Tor browser - https://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://7rzpyw3hflwe2c7h.onion/?XOQRTVWY 5. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. Alternate communication channel here: http://helpqvrg3cc5mvb3.onion/
URLs

http://7rzpyw3hflwe2c7h.onion/?XOQRTVWY

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Suspicious use of WriteProcessMemory 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1374 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Drops file in Program Files directory 7369 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\703a1s0ssssd7da.exe
    "C:\Users\Admin\AppData\Local\Temp\703a1s0ssssd7da.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\703a1s0ssssd7da.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      PID:2696
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
      PID:3188

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2696-0-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2696-1-0x0000000000407CA0-mapping.dmp
    • memory/2696-2-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB