9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.zip
General
Target
Filesize
Completed
9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe
592KB
26-10-2020 12:51
Score
10
/10
MD5
SHA1
SHA256
2bc8eb9cd7e24da82800105ce3fc52e7
1b75ab3c677b082fae270da1e8d0d2841837d67a
9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae
Malware Config
Extracted
Path | C:\Users\Admin\Desktop\README_encrypted.txt |
Ransom Note |
ATTENTION!!! ALL YOUR FILES HAVE BEEN ENCRYPTED
YOU HAVE TO PAY $1000 DOLLARS TO UNLOCK YOUR FILES.
PLEASE CONTACT <insert onion site here>.onion using Tor Browser.
Make sure to provide the metadata.bin file that you can find in your user
folder.
|
Signatures 4
Filter: none
Collection
Credential Access
Defense Evasion
Persistence
-
Modifies extensions of user files9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe
Description
Ransomware generally changes the extension on encrypted files.
Tags
Reported IOCs
description ioc process File created C:\Users\Admin\Pictures\ImportSync.png_encrypted 9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe File created C:\Users\Admin\Pictures\RestartUse.raw_encrypted 9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe File created C:\Users\Admin\Pictures\SwitchRestart.tif_encrypted 9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe File created C:\Users\Admin\Pictures\ExpandAdd.png_encrypted 9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe -
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Modifies service9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exevssvc.exe
Tags
TTPs
Reported IOCs
description ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher 9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe -
Suspicious use of AdjustPrivilegeTokenvssvc.exe
Reported IOCs
description pid process Token: SeBackupPrivilege 612 vssvc.exe Token: SeRestorePrivilege 612 vssvc.exe Token: SeAuditPrivilege 612 vssvc.exe
Processes 2
-
C:\Users\Admin\AppData\Local\Temp\9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe"C:\Users\Admin\AppData\Local\Temp\9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe"Modifies extensions of user filesModifies service
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeModifies serviceSuspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
Download
memory/1892-0-0x0000000000400000-0x000000000049B000-memory.dmp
Title
Loading Data