Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    26-10-2020 12:48

General

  • Target

    9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe

  • Size

    592KB

  • MD5

    2bc8eb9cd7e24da82800105ce3fc52e7

  • SHA1

    1b75ab3c677b082fae270da1e8d0d2841837d67a

  • SHA256

    9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae

  • SHA512

    ded152931da733433c4b6921313019cae0749bdff91d19bddf489478547628b3a4dcf42438515c83e965b38c7ce256cdba408fe22b68777c583cae014e5d2903

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\README_encrypted.txt

Ransom Note
ATTENTION!!! ALL YOUR FILES HAVE BEEN ENCRYPTED YOU HAVE TO PAY $1000 DOLLARS TO UNLOCK YOUR FILES. PLEASE CONTACT <insert onion site here>.onion using Tor Browser. Make sure to provide the metadata.bin file that you can find in your user folder.

Signatures

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies service 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe
    "C:\Users\Admin\AppData\Local\Temp\9be3b8dff2d24146e732fa8f81b1a56860b579622e31c991ceaf847ade9717ae.exe"
    1⤵
    • Modifies extensions of user files
    • Modifies service
    PID:1892
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:612

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1892-0-0x0000000000400000-0x000000000049B000-memory.dmp
    Filesize

    620KB