Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-11-2020 19:24
Static task
static1
Behavioral task
behavioral1
Sample
ag.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ag.exe
Resource
win10v20201028
General
-
Target
ag.exe
-
Size
179KB
-
MD5
06ce6cd8bde756265f95fcf4eecadbe9
-
SHA1
bacf50b20f1cf2165ac96535aeac36b49c8a8677
-
SHA256
9a7daafc56300bd94ceef23eac56a0735b63ec6b9a7a409fb5a9b63efe1aa0b0
-
SHA512
b13677539da247707e7016c56aaba889826648b3050428974aca6d109d7fa88d7e610a61214ddee06f1fa09c287ade6f71182b999955c6d3674d5701b0f89326
Malware Config
Extracted
C:\MSOCache\read_me_lkdtt.txt
http://6x7dp6h3w6q3ugjv4yv5gycj3femb24kysgry5b44hhgfwc5ml5qrdad.onion/02f6af250649555ea1b65f20fd9e815b23ba7d84829b93e6d8dbdb10f82c5af4
Signatures
-
HelloKitty Ransomware
Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
ag.exedescription ioc process File renamed C:\Users\Admin\Pictures\SetOut.crw => C:\Users\Admin\Pictures\SetOut.crw.crypted ag.exe File renamed C:\Users\Admin\Pictures\StepComplete.tif => C:\Users\Admin\Pictures\StepComplete.tif.crypted ag.exe File renamed C:\Users\Admin\Pictures\UnpublishReceive.tif => C:\Users\Admin\Pictures\UnpublishReceive.tif.crypted ag.exe File renamed C:\Users\Admin\Pictures\JoinUse.raw => C:\Users\Admin\Pictures\JoinUse.raw.crypted ag.exe File renamed C:\Users\Admin\Pictures\ReceiveEnter.tiff => C:\Users\Admin\Pictures\ReceiveEnter.tiff.crypted ag.exe File renamed C:\Users\Admin\Pictures\RedoRead.tif => C:\Users\Admin\Pictures\RedoRead.tif.crypted ag.exe File renamed C:\Users\Admin\Pictures\RequestRegister.crw => C:\Users\Admin\Pictures\RequestRegister.crw.crypted ag.exe File renamed C:\Users\Admin\Pictures\AddRegister.crw => C:\Users\Admin\Pictures\AddRegister.crw.crypted ag.exe File renamed C:\Users\Admin\Pictures\EnterGroup.crw => C:\Users\Admin\Pictures\EnterGroup.crw.crypted ag.exe File opened for modification C:\Users\Admin\Pictures\ReceiveEnter.tiff ag.exe File renamed C:\Users\Admin\Pictures\SplitRegister.crw => C:\Users\Admin\Pictures\SplitRegister.crw.crypted ag.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1320 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 684 vssvc.exe Token: SeRestorePrivilege 684 vssvc.exe Token: SeAuditPrivilege 684 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ag.execmd.exedescription pid process target process PID 2024 wrote to memory of 1320 2024 ag.exe cmd.exe PID 2024 wrote to memory of 1320 2024 ag.exe cmd.exe PID 2024 wrote to memory of 1320 2024 ag.exe cmd.exe PID 2024 wrote to memory of 1320 2024 ag.exe cmd.exe PID 1320 wrote to memory of 1608 1320 cmd.exe PING.EXE PID 1320 wrote to memory of 1608 1320 cmd.exe PING.EXE PID 1320 wrote to memory of 1608 1320 cmd.exe PING.EXE PID 1320 wrote to memory of 1608 1320 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ag.exe"C:\Users\Admin\AppData\Local\Temp\ag.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 127.0.0.1 & del ag.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1608
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:684