Analysis

  • max time kernel
    151s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-12-2020 14:46

General

  • Target

    202010121236.scr

  • Size

    449KB

  • MD5

    574f031251f67bcc6ea9168364d2fbfd

  • SHA1

    f5d6140140829eaa550d2ef57b3ca8281b3d79bb

  • SHA256

    438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

  • SHA512

    d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: yongloun@tutanota.com and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: wiruxa@airmail.cc Reserved email: anygrishevich@yandex.ru Your personal ID: 128-806-0EA Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Emails

wiruxa@airmail.cc

anygrishevich@yandex.ru

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 13760 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1183 IoCs
  • Suspicious use of AdjustPrivilegeToken 85 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\202010121236.scr
    "C:\Users\Admin\AppData\Local\Temp\202010121236.scr" /S
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -start
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:588
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
        3⤵
          PID:1592
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
          3⤵
            PID:268
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
            3⤵
              PID:1636
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:576
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:828
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1892
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -agent 0
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              PID:1580
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1796
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1148
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe
            2⤵
            • Deletes itself
            PID:1648
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:956

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        File Deletion

        2
        T1107

        Modify Registry

        2
        T1112

        Install Root Certificate

        1
        T1130

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        1
        T1082

        Command and Control

        Web Service

        1
        T1102

        Impact

        Inhibit System Recovery

        2
        T1490

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          85934f14cc9248f76c58dc21180b4f15

          SHA1

          5ae41d9bea1cd413260de621f2302febd1e00323

          SHA256

          0d0b47c2e46b455f2d5b2bc0893585790da8a86e36f4a45311bf0a579a5efe58

          SHA512

          8496972fcf149a5df72b1a9aef3865c27fe0b9cba9e3af03b0a562c8b64a89d8834a3c18008d1610fab0741decadfdb1c14f9c1b9d1307bbb23a0b6a148b5e88

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          4bddfe3851f7aa064be1b88af5e4516d

          SHA1

          2619398420a8e45f8f68c7c02ff2fd8c5ae3f18a

          SHA256

          1427416bef65c2419a8fc224206c5131d6d7b391bc74faae87859640ce0fc3dc

          SHA512

          1874f93cc946fe5a1f1852f0bb740247cb8835993d7cd217e1347af794b6f606c9ad9c1b6b0604c229296d170961c88d0b31824b9f854d326fe8b10557e84040

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          a54e6020d8dade29e93e679d7d067676

          SHA1

          1ff53fa146566b3dc7a4dc43c91650a89b0bca5f

          SHA256

          3762d5141f299aa6d5bb5197aa8459d1741a4602c875a14531b77ebc861c7bbb

          SHA512

          87da29500b7ca80c15eea68253298c50073e2c643aae474b700ddd8117f7eac6bd53fc9a5358aa2bebe513e2041ca101337a13f21f0ef16450607ecc7f57b43d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          e701dced7f71531010737b88f0aae2ae

          SHA1

          2b681bc734b3b3fadb6bd72fdf358d710dffbd67

          SHA256

          661e189327784fc1cbbc426d063482ab68f7eaf4f01e4c34256d3d1df70ab2df

          SHA512

          db233914794efe239b55c5f9005ca5e04410111fe4bbd76f8a45fed7d608310905c6646c689fa2603a48768df765fdc4152a5f7fd1b19daff89a1a7b2df6ebc1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          0ab9b1924797144ddb10af6b1885a010

          SHA1

          351ff7400e78ff4a5b4345ec8648592b61477ee6

          SHA256

          3c0e5fedfa7fb056e5f9f99e6a768e9ca129638928f2f293071dd8a61f0dea12

          SHA512

          28a08537055ab9b30b1168171c845da4c3231254d1f1cbdc94dbc85f18226e3ecabf40e9d8dba70018000f607830f826110a97300d8f738b3c327e2e02665753

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          91236466d1cd77743c5ae5ab0510f08c

          SHA1

          65928c8697e72d0175d7c94981b835f083042a19

          SHA256

          fedce7da5b18bc0bb1347c627064ad334952abdf35d1be18a7d2d357a1b802f7

          SHA512

          f7f8e8a57336b593081297da88c938a10bcd9a0ca364e0a435e0defee00e943f56fd9823544cf80dcd26c57c9d5663f7d916583ad644db4c2b8f6aeefc1ed37f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          8c80560d5ee82439c063eae42f31984f

          SHA1

          93498285e878572647b471bb09988ef8c3e04b41

          SHA256

          34528b3d20c173076a1dd7ec5a0133e022f9866c15e22bd5813b0b0240818064

          SHA512

          770f1c7d4252b6be2e64fa15fe8a73c9d07d9166fd264fa5c57afc253a2c914851c3a023186769099e138645937075c672e7cb6521c28d7bc2d8f0f837b05359

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\QRJVIHYQ.htm
          MD5

          8615e70875c2cc0b9db16027b9adf11d

          SHA1

          4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

          SHA256

          da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

          SHA512

          cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7ISB2KAC\E3M1F9WA.htm
          MD5

          b1cd7c031debba3a5c77b39b6791c1a7

          SHA1

          e5d91e14e9c685b06f00e550d9e189deb2075f76

          SHA256

          57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

          SHA512

          d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

        • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
          MD5

          ef572e2c7b1bbd57654b36e8dcfdc37a

          SHA1

          b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

          SHA256

          e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

          SHA512

          b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • memory/268-19-0x0000000000000000-mapping.dmp
        • memory/576-22-0x0000000000000000-mapping.dmp
        • memory/588-28-0x0000000000000000-mapping.dmp
        • memory/828-30-0x0000000000000000-mapping.dmp
        • memory/1148-27-0x0000000000000000-mapping.dmp
        • memory/1460-4-0x0000000000000000-mapping.dmp
        • memory/1576-2-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp
          Filesize

          2.5MB

        • memory/1580-25-0x0000000000000000-mapping.dmp
        • memory/1592-18-0x0000000000000000-mapping.dmp
        • memory/1636-20-0x0000000000000000-mapping.dmp
        • memory/1648-6-0x00000000000E0000-0x00000000000E1000-memory.dmp
          Filesize

          4KB

        • memory/1648-7-0x0000000000000000-mapping.dmp
        • memory/1700-17-0x0000000000000000-mapping.dmp
        • memory/1796-21-0x0000000000000000-mapping.dmp
        • memory/1892-31-0x0000000000000000-mapping.dmp