Resubmissions

19/11/2020, 14:39

201119-59epbrqadx 10

19/11/2020, 14:22

201119-ff99dc42e6 10

19/11/2020, 14:16

201119-298y5e8ncj 9

Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19/11/2020, 14:39

General

  • Target

    f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe

  • Size

    1.8MB

  • MD5

    10d7151b9ee53b8da8ee6f85001ffb20

  • SHA1

    76d33ef58ea7b012342d975d871db64840da9675

  • SHA256

    f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093

  • SHA512

    1c6d2d7f509b462b5d48db61817ee42a7204d10141c59394eb190d0dba733b831a6344bb85197dfac358939379e640c9f38732d376e28f92e187806ca574d10f

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html

Ransom Note
Critical Error! Your files have been corrupted! Follow these directions to easily restore them: 1. Purchase around $200 in Bitcoin (BTC). To learn more about Bitcoin, visit https://bitcoin.org/en/buy or https://buy.bitcoin.com 2. Send the new Bitcoin to the following address: 14BfVG4vH71NLmhu7vFKi9EMmeZFoiAsYP 3. Contact our Tech Support team at [email protected] and explain your issue. 4. After confirming your Bitcoin transfer, we will send you a file-repair tool to fix your entire system. 5. Run our file-cleaner and wait... Your data will be restored. To test our services, you may send up to 2 files for repairing before making the Bitcoin transfer. Estimated repair time after Bitcoin transfer: 24 hours
Wallets

14BfVG4vH71NLmhu7vFKi9EMmeZFoiAsYP

URLs

https://bitcoin.org/en/buy

https://buy.bitcoin.com

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies extensions of user files 14 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Modifies registry class 36 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -WindowStyle Hidden get-wmiobject win32_computersystem | "fl model"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:928
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Start-Process C:\ProgramData\amdkey.bat -Verb runas
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:344
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\amdkey.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:308
        • C:\Windows\system32\vssadmin.exe
          vssadmin.exe Delete Shadows /All /Quiet
          4⤵
          • Interacts with shadow copies
          PID:1608
        • C:\Windows\system32\vssadmin.exe
          vssadmin.exe Resize ShadowStorage /For=C: /On=C: /MaxSize=320MB
          4⤵
          • Interacts with shadow copies
          PID:2620
        • C:\Windows\system32\net.exe
          net user /add RedROMAN p4zzaub71h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 user /add RedROMAN p4zzaub71h
            5⤵
              PID:2664
          • C:\Windows\system32\net.exe
            net localgroup administrators RedROMAN /add
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup administrators RedROMAN /add
              5⤵
                PID:2704
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Modifies service
        • Suspicious use of AdjustPrivilegeToken
        PID:816
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2880
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:406541 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2324
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x488
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2164
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\ProgramData\RR_README.html
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:324

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/344-17-0x000000001AB40000-0x000000001AB41000-memory.dmp

        Filesize

        4KB

      • memory/344-15-0x0000000002500000-0x0000000002501000-memory.dmp

        Filesize

        4KB

      • memory/344-11-0x000007FEF54F0000-0x000007FEF5EDC000-memory.dmp

        Filesize

        9.9MB

      • memory/344-12-0x0000000002020000-0x0000000002021000-memory.dmp

        Filesize

        4KB

      • memory/344-13-0x000000001AC70000-0x000000001AC71000-memory.dmp

        Filesize

        4KB

      • memory/344-14-0x00000000020D0000-0x00000000020D1000-memory.dmp

        Filesize

        4KB

      • memory/928-3-0x00000000022E0000-0x00000000022E1000-memory.dmp

        Filesize

        4KB

      • memory/928-4-0x000000001AAC0000-0x000000001AAC1000-memory.dmp

        Filesize

        4KB

      • memory/928-8-0x000000001C670000-0x000000001C671000-memory.dmp

        Filesize

        4KB

      • memory/928-5-0x0000000002440000-0x0000000002441000-memory.dmp

        Filesize

        4KB

      • memory/928-6-0x0000000002510000-0x0000000002511000-memory.dmp

        Filesize

        4KB

      • memory/928-2-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

        Filesize

        9.9MB

      • memory/928-7-0x000000001B430000-0x000000001B431000-memory.dmp

        Filesize

        4KB

      • memory/1360-0-0x000000013FB60000-0x000000013FD31000-memory.dmp

        Filesize

        1.8MB

      • memory/2784-26-0x000007FEF60B0000-0x000007FEF632A000-memory.dmp

        Filesize

        2.5MB

      • memory/2880-38-0x00000000061F0000-0x0000000006213000-memory.dmp

        Filesize

        140KB