Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows7_x64 -
resource
win7 -
submitted
02/10/2020, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
ky.bin.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ky.bin.exe
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
ky.bin.exe
-
Size
421KB
-
MD5
80143152971ee77d14bb77c8d10346ec
-
SHA1
6c6e9ebe1e11714bd4c3584fc5b732ccfb782a05
-
SHA256
7860832a25f403c43865c00bd072fa58b2da66bc81152eec30582ad0a72932e6
-
SHA512
133f5a81542f5475597b5d2dea84af932ff49df5286a27dc9ce0dfdaa200d52f6cec8fd9f44c07e86e2585195c278874953e4dcd15a5b1a7845f704125e0c36b
Score
10/10
Malware Config
Extracted
Path
C:\$Recycle.Bin\S-1-5-21-1131729243-447456001-3632642222-1000\SYMMYWARE.TXT
Ransom Note
*-------=SymmiWare=-------*
All your files was ciphered by Strong algorythm AES-128.
Take your time, no one will be able to decrypt your files without our decryption service.
To decrypt files, pay $ 0 in Bitcoins. If you do not have 0 bitcoins (everyone has it) then go to the site localbitcoins.com and there send to our wallet (which we do not have) and write to the mail [email protected] to get the key and the decoder.
We advise you not to mess around because you still do not restore their hands.
We've also encrypted all your drives, files on your hard drives and network drives.
AES-128 is the Most reliable military-grade cryptographic algorithm.
There's no way to hack it, not even with a supercomputer.
The file cutter will start in 48 hours.
Don't be stupid and ugly like Patrick.
Any hacking attempts can fuck all of your data and the locker will turn them into pee-pee.
Good luck. Goodbye.
P.S I'm not spreading, and I can't.
P.P.S. The best time to send a letter: after November 25 (while we register the mail), and the fact that we wrote about 48 hours - it was a joke. We do not count down the time until the system is removed.
*-------=SymmiWare=-------*
Emails
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1192 PsExec.exe 1912 hyBrDFjOidLuty.exe -
Modifies Installed Components in the registry 2 TTPs
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\InvokeClose.raw => C:\Users\Admin\Pictures\InvokeClose.raw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\RedoSearch.crw => C:\Users\Admin\Pictures\RedoSearch.crw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\StepOut.png => C:\Users\Admin\Pictures\StepOut.png.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\StepShow.raw => C:\Users\Admin\Pictures\StepShow.raw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\TestExpand.crw => C:\Users\Admin\Pictures\TestExpand.crw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\WriteApprove.crw => C:\Users\Admin\Pictures\WriteApprove.crw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\DebugConvertFrom.png => C:\Users\Admin\Pictures\DebugConvertFrom.png.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\DisableDismount.raw => C:\Users\Admin\Pictures\DisableDismount.raw.SYMMYWARE hyBrDFjOidLuty.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\SYMMYWARE.TXT hyBrDFjOidLuty.exe -
Loads dropped DLL 1 IoCs
pid Process 1192 PsExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 896 ky.bin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1192 PsExec.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 896 ky.bin.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe 1912 hyBrDFjOidLuty.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1912 hyBrDFjOidLuty.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe Token: SeShutdownPrivilege 1624 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe 1624 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 896 wrote to memory of 1876 896 ky.bin.exe 25 PID 896 wrote to memory of 1876 896 ky.bin.exe 25 PID 896 wrote to memory of 1876 896 ky.bin.exe 25 PID 896 wrote to memory of 1876 896 ky.bin.exe 25 PID 1876 wrote to memory of 1192 1876 cmd.exe 27 PID 1876 wrote to memory of 1192 1876 cmd.exe 27 PID 1876 wrote to memory of 1192 1876 cmd.exe 27 PID 1876 wrote to memory of 1192 1876 cmd.exe 27 PID 1192 wrote to memory of 1912 1192 PsExec.exe 28 PID 1192 wrote to memory of 1912 1192 PsExec.exe 28 PID 1192 wrote to memory of 1912 1192 PsExec.exe 28 PID 1192 wrote to memory of 1912 1192 PsExec.exe 28 PID 1912 wrote to memory of 1628 1912 hyBrDFjOidLuty.exe 30 PID 1912 wrote to memory of 1628 1912 hyBrDFjOidLuty.exe 30 PID 1912 wrote to memory of 1628 1912 hyBrDFjOidLuty.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ky.bin.exe"C:\Users\Admin\AppData\Local\Temp\ky.bin.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\34C6.tmp\34D7.bat C:\Users\Admin\AppData\Local\Temp\ky.bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\PsExec.exepsexec hyBrDFjOidLuty.exe /accepteula -s -high3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\hyBrDFjOidLuty.exe"hyBrDFjOidLuty.exe" /accepteula -s -high4⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"5⤵PID:1628
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies service
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1624