Resubmissions

07-11-2020 21:55

201107-hpbkxklwmn 10

07-11-2020 21:28

201107-vkwbkzk1ej 10

Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    07-11-2020 21:28

General

  • Target

    lsass.exe

  • Size

    214KB

  • MD5

    3a87a3c5abcdc92ef421700ac6f5d0d1

  • SHA1

    70509f9eed0f90f62b804da75aa73b6a3f6390ec

  • SHA256

    45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

  • SHA512

    f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: tomriddle1337@cock.li and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: tomriddle1337@cock.li Reserved email: riddletom1337@protonmail.com Your personal ID: 285-093-7AC Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Emails

tomriddle1337@cock.li

riddletom1337@protonmail.com

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies service 2 TTPs 4 IoCs
  • Drops file in Program Files directory 13766 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 1224 IoCs
  • Suspicious use of AdjustPrivilegeToken 85 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lsass.exe
    "C:\Users\Admin\AppData\Local\Temp\lsass.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1412
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
        3⤵
          PID:1940
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
          3⤵
            PID:1712
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
            3⤵
              PID:1404
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:672
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1636
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:940
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1820
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1588
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 0
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              PID:1648
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe
            2⤵
            • Deletes itself
            PID:1636
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Modifies service
          • Suspicious use of AdjustPrivilegeToken
          PID:956

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Modify Existing Service

        1
        T1031

        Defense Evasion

        File Deletion

        2
        T1107

        Modify Registry

        3
        T1112

        Install Root Certificate

        1
        T1130

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        1
        T1082

        Command and Control

        Web Service

        1
        T1102

        Impact

        Inhibit System Recovery

        2
        T1490

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          e5be8c65934ad0c00c584026d085108e

          SHA1

          6ce4c8bc54630bf9f70d3fe93ce91bf44004439f

          SHA256

          68413df5f5923c0283167f5bf10bb7a65b1cdbea7602d263f64af49820efa315

          SHA512

          50470648453a249e3ec06572fd418a123bd0500291a8b3bc0c7cde453ac36e027130f49f01c17ab21034d6033abe1f81402166ee80460b0fcb56856f20db2539

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          3208da0c038576623565b095fcea4ad1

          SHA1

          bc421f8eb4b9c6100aa444edece988c01dd63b26

          SHA256

          16ca708624c0f83871bbb8349e31fba20e5591f298ee91ddf08faf2919041f4b

          SHA512

          17fd810bdb400ce06167d6009a23cbdafdeb5eb0cb5c18456ec3a833546ad050429b003bdec753aa591d5b370cbb1290633abc1cc71f3ae29e81d58c56b8408c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          3bf227caeee1b07d47b29873a1640f1a

          SHA1

          61af6e587db89d7d7f518bb1e16c2d73451e5ed6

          SHA256

          30becef61dd6dd9d8b0402aec82db12ebb3ef7b76d854ca1f8bd30fa50ab5980

          SHA512

          29a3663efa62ccc6dce4e083b7e43e80560de48ebc0eebfff5aed1fc158f0ed65a009589046773cb3c97588005219f45ae414c53f7bffe5a0a2ec80b0c2a903e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          bd730d25752cdb8b3f67287d39d2bb7d

          SHA1

          b0215d5567755abae2e6e1c8403393080401769f

          SHA256

          997c071496860e6e483aeb77ff800f71c5db514823b199834d725df0bbddbbb4

          SHA512

          0dc8e16507c1c95b54f05329976d5652b4d7f960ca724b4bee7cc75245be3bb44b41d5e147406e7abcb29aed3795bcc7c80eeebcbb489096c73b9ab8b98af265

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          4be7bf0c0097f15ee42b11114da8fca2

          SHA1

          970f042f5ddddba7aac200af55eac4d894cca5d6

          SHA256

          4356b03573a54e751fee6ff5f1cd4461fdf69a33e6a4116c138073e9affdb40f

          SHA512

          f3e872159ba7b71a672bc4312595936b246f450595f08d81b8aa6ca7466c8f0cd9055b3a703f8414f81b828aa2d3e02c66bdec6af999b16907f89b2949cab45a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          46a10d6f47d9c2e9c364ea41758149e1

          SHA1

          d0a3d23dda779e76bbc790395ad6f3d87dddb679

          SHA256

          b1196a089f4128fb5a2467c53cf4c87258a052999890a659c4eda3d9f0d94462

          SHA512

          45ce7a79c801f97f47dac6af0acfc424143ae232221a8fb73b24b8095e314413e0e9a7e989395369f63f1a6b3abef43eb02c70367e0ac7da81fcaf57dfce5dbf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          e191bd4c9f9c67f22677a1dd94f29820

          SHA1

          01fd3cd919e6fe3147a82c7cae4c7f87816c6282

          SHA256

          93509e9d87bbc04a39dabe1c0dd106e5455006bcee9bc0b7d7d9a637ba7ce44d

          SHA512

          0b4d64c5a376cc46d59e5a578a69c6096623e76d3f31c6affa570c73758f067bd09ea5ea90be37bdb540d6fac3c6b97e63b56cbf7bc3ba51d6b94c7659a4f08e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\AQX9PTZT.htm
          MD5

          8615e70875c2cc0b9db16027b9adf11d

          SHA1

          4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

          SHA256

          da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

          SHA512

          cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7ISB2KAC\2FDOYCER.htm
          MD5

          b1cd7c031debba3a5c77b39b6791c1a7

          SHA1

          e5d91e14e9c685b06f00e550d9e189deb2075f76

          SHA256

          57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

          SHA512

          d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

        • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
          MD5

          ef572e2c7b1bbd57654b36e8dcfdc37a

          SHA1

          b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

          SHA256

          e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

          SHA512

          b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          3a87a3c5abcdc92ef421700ac6f5d0d1

          SHA1

          70509f9eed0f90f62b804da75aa73b6a3f6390ec

          SHA256

          45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

          SHA512

          f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          3a87a3c5abcdc92ef421700ac6f5d0d1

          SHA1

          70509f9eed0f90f62b804da75aa73b6a3f6390ec

          SHA256

          45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

          SHA512

          f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          3a87a3c5abcdc92ef421700ac6f5d0d1

          SHA1

          70509f9eed0f90f62b804da75aa73b6a3f6390ec

          SHA256

          45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

          SHA512

          f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          3a87a3c5abcdc92ef421700ac6f5d0d1

          SHA1

          70509f9eed0f90f62b804da75aa73b6a3f6390ec

          SHA256

          45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

          SHA512

          f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          3a87a3c5abcdc92ef421700ac6f5d0d1

          SHA1

          70509f9eed0f90f62b804da75aa73b6a3f6390ec

          SHA256

          45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

          SHA512

          f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

        • memory/668-16-0x0000000000000000-mapping.dmp
        • memory/672-20-0x0000000000000000-mapping.dmp
        • memory/940-21-0x0000000000000000-mapping.dmp
        • memory/1212-3-0x0000000000000000-mapping.dmp
        • memory/1404-19-0x0000000000000000-mapping.dmp
        • memory/1412-25-0x0000000000000000-mapping.dmp
        • memory/1588-29-0x0000000000000000-mapping.dmp
        • memory/1636-5-0x00000000000E0000-0x00000000000E1000-memory.dmp
          Filesize

          4KB

        • memory/1636-26-0x0000000000000000-mapping.dmp
        • memory/1636-6-0x0000000000000000-mapping.dmp
        • memory/1648-23-0x0000000000000000-mapping.dmp
        • memory/1712-18-0x0000000000000000-mapping.dmp
        • memory/1716-0-0x000007FEF7900000-0x000007FEF7B7A000-memory.dmp
          Filesize

          2.5MB

        • memory/1820-28-0x0000000000000000-mapping.dmp
        • memory/1940-17-0x0000000000000000-mapping.dmp