Analysis

  • max time kernel
    116s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    13-07-2020 13:56

General

  • Target

    1d67abe1ec08e6215e08d6bb595ade3d1d33d0e886edf887b29f4d8e1d46e593.exe

  • Size

    4.6MB

  • MD5

    7d9c6313b2e412f0db4380b279eb4fed

  • SHA1

    0675b3958e7eef4090775f665d8201837f167f01

  • SHA256

    1d67abe1ec08e6215e08d6bb595ade3d1d33d0e886edf887b29f4d8e1d46e593

  • SHA512

    ddaa21b661f448442df6556dec57429636e7aa6fa9ce4f098ac218cc702b301903c7bf254b9aee732a90561402b420d977be6bb7940bf49aa55e0e5f9991075e

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Hello! All your files are encrypted, write to me if you want to return your files - I can do it very quickly! Contact me by email: [email protected] or [email protected] The subject line must contain an encryption extension or the name of your company! Do not rename encrypted files, you may lose them forever. You may be a victim of fraud. Free decryption as a guarantee. Send us up to 3 files for free decryption. The total file size should be no more than 1 MB! (not in the archive), and the files should not contain valuable information. (databases, backups, large Excel spreadsheets, etc.) !!! Do not turn off or restart the NAS equipment. This will lead to data loss !!!

Signatures

  • Suspicious use of WriteProcessMemory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies service 2 TTPs 5 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Drops file in Program Files directory 14817 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops startup file 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d67abe1ec08e6215e08d6bb595ade3d1d33d0e886edf887b29f4d8e1d46e593.exe
    "C:\Users\Admin\AppData\Local\Temp\1d67abe1ec08e6215e08d6bb595ade3d1d33d0e886edf887b29f4d8e1d46e593.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Drops file in Program Files directory
    • Drops startup file
    PID:900
    • C:\Windows\system32\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\kboivghkklyakv.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:800
      • C:\Windows\system32\sc.exe
        SC QUERY
        3⤵
          PID:1096
        • C:\Windows\system32\findstr.exe
          FINDSTR SERVICE_NAME
          3⤵
            PID:1080
        • C:\Windows\system32\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\gpdryggcrrf.bat
          2⤵
            PID:1516
          • C:\Windows\system32\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\vselkhqibxgiuulwmnqw.bat
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1904
            • C:\Windows\system32\vssadmin.exe
              vssadmin delete shadows /all /quiet
              3⤵
              • Interacts with shadow copies
              PID:1204
          • C:\Windows\system32\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\twdlhcvrrrxia.bat
            2⤵
              PID:2020
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            • Modifies service
            PID:1952

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\kboivghkklyakv.bat

          • C:\Users\Admin\AppData\Local\Temp\vselkhqibxgiuulwmnqw.bat

          • memory/800-0-0x0000000000000000-mapping.dmp

          • memory/1080-3-0x0000000000000000-mapping.dmp

          • memory/1096-2-0x0000000000000000-mapping.dmp

          • memory/1204-7-0x0000000000000000-mapping.dmp

          • memory/1516-4-0x0000000000000000-mapping.dmp

          • memory/1904-5-0x0000000000000000-mapping.dmp

          • memory/2020-8-0x0000000000000000-mapping.dmp