Analysis

  • max time kernel
    151s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    22-09-2020 17:31

General

  • Target

    pewpew_p.bin.exe

  • Size

    1.0MB

  • MD5

    202bf9be9a4e45526e482f08104717ad

  • SHA1

    1e5bbfb9167150935c6eb25bbbebbe5c77a97aa2

  • SHA256

    7282df1360af4c028930ffd9fbc30ea9d17f08f14b725f8020677dd9df961c55

  • SHA512

    89db20536030f28af5997d4b93e90ead0ccd7299d6777d422159a0a41b658274743a390fed1a9f942b668f4f04afd1119e7b4a41356b10ea37393c8b5e05f5ea

Malware Config

Extracted

Path

C:\info-decrypt.txt

Ransom Note
All your files have been encrypted ! ( All your files have been encrypted with AES256 + RSA2048 Algorithm due to a security problem with your PC ) - If you want to restore them, write us to the e-mail : pewpew@TuTa.io - Write this ID in the title of your message : F86B013E - If you do not receive a response within 12 hours, send a message to this email : pewpew@Protonmail.Com ( You have to pay for decryption in Bitcoins ) - The price depends on how fast you write to us. - After payment we will send you the decryption tool that will decrypt all your files. ( Free decryption as guarantee ) - Before paying you can send us up to 1 file for free decryption. - The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) ( How to obtain Bitcoins ) - The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. - https://localbitcoins.com/buy_bitcoins - Also you can find other places to buy Bitcoins and beginners guide here: - http://www.coindesk.com/information/how-can-i-buy-bitcoins/ - [ pewpew TEAM ]
Emails

pewpew@TuTa.io

pewpew@Protonmail.Com

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 87 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies service 2 TTPs 15 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Drops file in Program Files directory 2049 IoCs
  • Drops file in Windows directory 1 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pewpew_p.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\pewpew_p.bin.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:876
    • C:\Windows\system32\cmd.exe
      "cmd" /C vssadmin Delete Shadows /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\system32\vssadmin.exe
        vssadmin Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1508
    • C:\Windows\system32\netsh.exe
      "netsh.exe" Advfirewall set allprofiles state off
      2⤵
      • Modifies service
      PID:1792
    • C:\Windows\system32\netsh.exe
      "netsh.exe" Advfirewall set allprofiles state off
      2⤵
      • Modifies service
      PID:1664
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:804

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/240-0-0x0000000002890000-0x00000000028A1000-memory.dmp
    Filesize

    68KB

  • memory/240-1-0x0000000002AF0000-0x0000000002B01000-memory.dmp
    Filesize

    68KB

  • memory/240-2-0x0000000073DF0000-0x00000000744DE000-memory.dmp
    Filesize

    6.9MB

  • memory/240-3-0x0000000000A80000-0x0000000000A81000-memory.dmp
    Filesize

    4KB

  • memory/876-7-0x0000000000000000-mapping.dmp
  • memory/1148-5-0x0000000000000000-mapping.dmp
  • memory/1508-8-0x0000000000000000-mapping.dmp
  • memory/1664-10-0x0000000000000000-mapping.dmp
  • memory/1792-9-0x0000000000000000-mapping.dmp
  • memory/2044-6-0x0000000000000000-mapping.dmp