Analysis

  • max time kernel
    62s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    13/07/2020, 14:01

General

  • Target

    fefb3c7053a1332b03a4c0523862e8e387a5065b263cf10cb0d7f33f02afc646.exe

  • Size

    4.6MB

  • MD5

    b4fb8e289a0436895defe466a150f4bd

  • SHA1

    87784505e4fb2efe696b86465ccf230d92e0efa4

  • SHA256

    fefb3c7053a1332b03a4c0523862e8e387a5065b263cf10cb0d7f33f02afc646

  • SHA512

    1ae00231aa059a2ce1b000f4458d20b6024b6e32da0a5de23c30dbe0a2110aeef524a16148f9b70e5b19d5faa891421acddc9da66a9bbb7a79c1981e4605b48e

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Hello! All your files are encrypted and only we can decrypt them. Contact us: [email protected] or [email protected] Write us if you want to return your files - we can do it very quickly! The header of letter must contain extension of encrypted files. We always reply within 24 hours. If not - check spam folder, resend your letter or try send letter from another email service (like protonmail.com). Attention! Do not rename or edit encrypted files: you may have permanent data loss. To prove that we can recover your files, we am ready to decrypt any three files (less than 1Mb) for free (except databases, Excel and backups). HURRY UP! If you do not email us in the next 48 hours then your data may be lost permanently.

Signatures

  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Suspicious use of WriteProcessMemory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Drops startup file 2 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Drops file in Program Files directory 14799 IoCs