Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    16-12-2020 23:45

General

  • Target

    438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8.exe

  • Size

    449KB

  • MD5

    574f031251f67bcc6ea9168364d2fbfd

  • SHA1

    f5d6140140829eaa550d2ef57b3ca8281b3d79bb

  • SHA256

    438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

  • SHA512

    d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: yongloun@tutanota.com and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: wiruxa@airmail.cc Reserved email: anygrishevich@yandex.ru Your personal ID: CEE-272-8B3 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Emails

wiruxa@airmail.cc

anygrishevich@yandex.ru

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 19780 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7548 IoCs
  • Suspicious use of AdjustPrivilegeToken 89 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8.exe
    "C:\Users\Admin\AppData\Local\Temp\438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2032
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
        3⤵
          PID:3908
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
          3⤵
            PID:4040
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
            3⤵
              PID:1040
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 0
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              PID:2456
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2680
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:744
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:3932
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1564
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1128
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe
            2⤵
            • Deletes itself
            PID:2328
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2176

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        File Deletion

        2
        T1107

        Modify Registry

        2
        T1112

        Install Root Certificate

        1
        T1130

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        1
        T1082

        Command and Control

        Web Service

        1
        T1102

        Impact

        Inhibit System Recovery

        2
        T1490

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          b36da5c81e37e66335b100fe541c1668

          SHA1

          81b166b7d5c9801ca146d1ef5b95aac47c952112

          SHA256

          996dbe67869eabac1e506abdc5b12c933eb5c735778481c9894c7a9ae9bd1d49

          SHA512

          c551487a3b6f952a7328abd2449934427209dc537a0c0429335facb7faa103fc5a8788197ab6f48830e184d953cbd0e9e99b4787e3565f52c9fd50759ff0abaa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          a39a754e0b0ba7e439a962153cc63feb

          SHA1

          b4d9a16bce5017a94196a68d87de254f0795922b

          SHA256

          bcd4f320f4b3cf23708d4f373d4eb0208c453dbaffa9f5b402ab73f127528c6e

          SHA512

          8c206e9fc85c7a05b4eaa34269c5af83bf016c043d881472b9f90ecf83c781892c450d1593d36bdcc080c552748e2fe61c439769ca93ccdc5a2453b74a2175b6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          c8f6d84e4c36d9393622a1af12a9a848

          SHA1

          1df0282b790a4a641c0f256a842141d5666a3f30

          SHA256

          c7b9816df943aee5e1923deaaa2abef8881da46a27fec381e0b92ac30f810ebb

          SHA512

          a835f48c7468366ebee56d2387493c5d789a695d895ad9c0f010cdd7ca96ed33269266a2ca4264a45021644d811853eab371520377bcdf404f70ab3b9ed6f9d1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          f0caafd7759ab9d808a54559a6bee942

          SHA1

          5af7b08c037c4a199fb180043e87589b836b0080

          SHA256

          967db85b59d6e62048ea582f0618dcf4fcd5da5c5898f10e57c3b9dc476a1a68

          SHA512

          a3d25e7a563c8272d56ea91f8a40eb151e31d80be56533426ec29544935cc036e01c84bff22c991ac22ef80af185373af12de5f99b566894f149da1049bcdf68

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          731c7e2c32ea0df6526cffef2f114c8a

          SHA1

          dd04e081c9e208ed5001666aed5e97a3dd2105ee

          SHA256

          21a8b06358f5d0e6220155a3bf5fb4e8f6049b08922218787a71693874c4be70

          SHA512

          ee56585ca7bb5741c6aaf6f481609b7fa3211649dd70071356d1b9c89a8b6d532511a3b635fbb8155d5206e92932da63dcff07d6c066be927397c4b48f4e412d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          5d2dddf999ed522879df7d8a00809d95

          SHA1

          ee686cef48d2b28b4ec790a11618736c225b9c91

          SHA256

          5f2b57c81e1c5b818843f5ba55aa9444fcdec96d45192c65941559ee8cdf35de

          SHA512

          9a11208781f61e555db02315cc2bffce9a7c766b70eb48e1de9c1efa7ca89e1f3bdb4d2ea8622afaba198f3e04d2695cb3c79d560d5123908d23935c05ca2389

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\5B101CTT.htm
          MD5

          b1cd7c031debba3a5c77b39b6791c1a7

          SHA1

          e5d91e14e9c685b06f00e550d9e189deb2075f76

          SHA256

          57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

          SHA512

          d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UOAPEAJQ\6Y8NUVKR.htm
          MD5

          8615e70875c2cc0b9db16027b9adf11d

          SHA1

          4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

          SHA256

          da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

          SHA512

          cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

        • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
          MD5

          ef572e2c7b1bbd57654b36e8dcfdc37a

          SHA1

          b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

          SHA256

          e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

          SHA512

          b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
          MD5

          574f031251f67bcc6ea9168364d2fbfd

          SHA1

          f5d6140140829eaa550d2ef57b3ca8281b3d79bb

          SHA256

          438d83a22ed38bb2241a99b96d644826522b28327f63055840ee7632d8e95cd8

          SHA512

          d7234b117aabb6a50e8619d4bc3a6d283c53d7a7ee396a67f73985d6e09156ab2fc89ec52bddbd949d9236ecde081cc0123719a474b12966a5beaf910de8a15b

        • memory/744-26-0x0000000000000000-mapping.dmp
        • memory/1040-18-0x0000000000000000-mapping.dmp
        • memory/1128-24-0x0000000000000000-mapping.dmp
        • memory/1564-19-0x0000000000000000-mapping.dmp
        • memory/2032-25-0x0000000000000000-mapping.dmp
        • memory/2156-15-0x0000000000000000-mapping.dmp
        • memory/2328-5-0x0000000002DD0000-0x0000000002DD1000-memory.dmp
          Filesize

          4KB

        • memory/2328-6-0x0000000000000000-mapping.dmp
        • memory/2456-21-0x0000000000000000-mapping.dmp
        • memory/2680-20-0x0000000000000000-mapping.dmp
        • memory/3608-2-0x0000000000000000-mapping.dmp
        • memory/3908-16-0x0000000000000000-mapping.dmp
        • memory/3932-27-0x0000000000000000-mapping.dmp
        • memory/4040-17-0x0000000000000000-mapping.dmp