Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    22-09-2020 17:31

General

  • Target

    pewpew_p.bin.exe

  • Size

    1.0MB

  • MD5

    202bf9be9a4e45526e482f08104717ad

  • SHA1

    1e5bbfb9167150935c6eb25bbbebbe5c77a97aa2

  • SHA256

    7282df1360af4c028930ffd9fbc30ea9d17f08f14b725f8020677dd9df961c55

  • SHA512

    89db20536030f28af5997d4b93e90ead0ccd7299d6777d422159a0a41b658274743a390fed1a9f942b668f4f04afd1119e7b4a41356b10ea37393c8b5e05f5ea

Malware Config

Extracted

Path

C:\info-decrypt.txt

Ransom Note
All your files have been encrypted ! ( All your files have been encrypted with AES256 + RSA2048 Algorithm due to a security problem with your PC ) - If you want to restore them, write us to the e-mail : pewpew@TuTa.io - Write this ID in the title of your message : F822B9BB - If you do not receive a response within 12 hours, send a message to this email : pewpew@Protonmail.Com ( You have to pay for decryption in Bitcoins ) - The price depends on how fast you write to us. - After payment we will send you the decryption tool that will decrypt all your files. ( Free decryption as guarantee ) - Before paying you can send us up to 1 file for free decryption. - The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) ( How to obtain Bitcoins ) - The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price. - https://localbitcoins.com/buy_bitcoins - Also you can find other places to buy Bitcoins and beginners guide here: - http://www.coindesk.com/information/how-can-i-buy-bitcoins/ - [ pewpew TEAM ]
Emails

pewpew@TuTa.io

pewpew@Protonmail.Com

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies Windows Firewall 1 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 13 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies service 2 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Drops file in Program Files directory 1168 IoCs
  • Drops file in Windows directory 1 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pewpew_p.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\pewpew_p.bin.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3392
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2252
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /C vssadmin Delete Shadows /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\system32\vssadmin.exe
        vssadmin Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2480
    • C:\Windows\SYSTEM32\netsh.exe
      "netsh.exe" Advfirewall set allprofiles state off
      2⤵
        PID:3952
      • C:\Windows\SYSTEM32\netsh.exe
        "netsh.exe" Advfirewall set allprofiles state off
        2⤵
          PID:3940
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Modifies service
        • Suspicious use of AdjustPrivilegeToken
        PID:1132

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      2
      T1031

      Defense Evasion

      File Deletion

      2
      T1107

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Collection

      Data from Local System

      1
      T1005

      Impact

      Inhibit System Recovery

      2
      T1490

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/864-0-0x0000000003C90000-0x0000000003C91000-memory.dmp
        Filesize

        4KB

      • memory/864-2-0x0000000003C90000-0x0000000003C91000-memory.dmp
        Filesize

        4KB

      • memory/864-4-0x0000000073150000-0x000000007383E000-memory.dmp
        Filesize

        6.9MB

      • memory/864-5-0x0000000000EA0000-0x0000000000EA1000-memory.dmp
        Filesize

        4KB

      • memory/864-7-0x0000000005FA0000-0x0000000005FA1000-memory.dmp
        Filesize

        4KB

      • memory/864-9-0x0000000007D10000-0x0000000007D11000-memory.dmp
        Filesize

        4KB

      • memory/1352-11-0x0000000000000000-mapping.dmp
      • memory/2252-12-0x0000000000000000-mapping.dmp
      • memory/2480-13-0x0000000000000000-mapping.dmp
      • memory/3392-10-0x0000000000000000-mapping.dmp
      • memory/3940-15-0x0000000000000000-mapping.dmp
      • memory/3952-14-0x0000000000000000-mapping.dmp