Analysis

  • max time kernel
    19s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-11-2020 18:31

General

  • Target

    spr3.bat

  • Size

    120B

  • MD5

    5a93bebc658e9839cd95d418708fc5d8

  • SHA1

    36f5d83b4f7fc32d85e086d14eb0187e4b09cea4

  • SHA256

    cf874be4989a99d539cef4c00c73213ac3d0a9aff044927d175eb6a37d7a3a59

  • SHA512

    f6231d0bce100ac26e41d3b7486a1e7ad6296b967b33c75aa13686800c187e9ac72e98e02c35f7284bf96542bb62da38e9ec2544d6a56c8888b7cbf75d482ee8

Malware Config

Extracted

Path

C:\RECOVER-FILES.txt

Ransom Note
------------------ | What happened? | ------------------ Your network was ATTACKED, your computers and servers were LOCKED, Your private data was DOWNLOADED. ---------------------- | What does it mean? | ---------------------- It means that soon mass media, your partners and clients WILL KNOW about your PROBLEM. -------------------------- | How it can be avoided? | -------------------------- In order to avoid this issue, you are to COME IN TOUCH WITH US no later than within 3 DAYS and conclude the data recovery and breach fixing AGREEMENT. ------------------------------------------- | What if I do not contact you in 3 days? | ------------------------------------------- If you do not contact us in the next 3 DAYS we will begin DATA publication. ----------------------------- | I can handle it by myself | ----------------------------- It is your RIGHT, but in this case all your data will be published for public USAGE. ------------------------------- | I do not fear your threats! | ------------------------------- That is not the threat, but the algorithm of our actions. If you have hundreds of millions of UNWANTED dollars, there is nothing to FEAR for you. That is the EXACT AMOUNT of money you will spend for recovery and payouts because of PUBLICATION. -------------------------- | You have convinced me! | -------------------------- Then you need to CONTACT US, there is few ways to DO that. I. Recommended (the most secure method) a) Download a special TOR browser: https://www.torproject.org/ b) Install the TOR browser c) Open our website with LIVE CHAT in the TOR browser: http://egregor4u5ipdzhv.onion/2A8DF942B436BE75 d) Follow the instructions on this page. II. If the first method is not suitable for you a) Open our website with LIVE CHAT: https://egregor.top/2A8DF942B436BE75 b) Follow the instructions on this page. Our LIVE SUPPORT is ready to ASSIST YOU on this website. ---------------------------------------- | What will I get in case of agreement | ---------------------------------------- You WILL GET full DECRYPTION of your machines in the network, FULL FILE LISTING of downloaded data, confirmation of downloaded data DELETION from our servers, RECOMMENDATIONS for securing your network perimeter. And the FULL CONFIDENTIALITY ABOUT INCIDENT. ---------------------------------------------------------------------------------- Do not redact this special technical block, we need this to authorize you. ---EGREGOR--- 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 ---EGREGOR---
URLs

http://egregor4u5ipdzhv.onion/2A8DF942B436BE75

https://egregor.top/2A8DF942B436BE75

Signatures

  • Egregor Ransomware

    Variant of the Sekhmet ransomware first seen in September 2020.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies service 2 TTPs 5 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\spr3.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\system32\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sm.dll",DllRegisterServer --passegregor10 --append="antani" --multiproc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sm.dll",DllRegisterServer --passegregor10 --append="antani" --multiproc
        3⤵
        • Modifies extensions of user files
        • Drops startup file
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1692

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1508-0-0x0000000000000000-mapping.dmp
  • memory/2000-1-0x0000000000000000-mapping.dmp
  • memory/2000-2-0x0000000000900000-0x000000000093F000-memory.dmp
    Filesize

    252KB

  • memory/2000-4-0x0000000000770000-0x000000000079A000-memory.dmp
    Filesize

    168KB