Resubmissions

28-12-2020 17:21

201228-w8s6w2cpm2 10

28-12-2020 11:12

201228-bctexhqz8s 10

Analysis

  • max time kernel
    129s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-12-2020 17:21

General

  • Target

    windows-update-cve-wfw.exe

  • Size

    2.7MB

  • MD5

    d3715ab62bb922b56fb64b38c3feae8f

  • SHA1

    5f3442d9fddc111a8ee3de9e5fe243f259da52c6

  • SHA256

    1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

  • SHA512

    8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\READMEV1.txt

Ransom Note
How to decrypt: Download Tor Browser (https://www.torproject.org/dist/torbrowser/10.0.7/torbrowser-install-10.0.7_en-US.exe) and install. Open http://decryptu7o2cckt5.onion with Tor Browser. Paste yor KEY 03b76-1c61afa6b-ca44645589-e266e and follow instructions Your KEY 03b76-1c61afa6b-ca44645589-e266e
URLs

http://decryptu7o2cckt5.onion

Signatures

  • UAC bypass 3 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates VirtualBox DLL files 2 TTPs
  • Looks for VirtualBox drivers on disk 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Looks for VMWare drivers on disk 2 TTPs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • JavaScript code in executable 7 IoCs
  • Drops file in Program Files directory 6138 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windows-update-cve-wfw.exe
    "C:\Users\Admin\AppData\Local\Temp\windows-update-cve-wfw.exe"
    1⤵
    • Drops startup file
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /C reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\system32\reg.exe
        reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:1780
    • C:\Windows\system32\cmd.exe
      cmd /C vssadmin Delete Shadows /All /Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\system32\vssadmin.exe
        vssadmin Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:1260
    • C:\Windows\system32\cmd.exe
      cmd /C "rd /s /q C:\\$RECYCLE.BIN"
      2⤵
        PID:396
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /C ping 127.0.0.1 -n 10 > nul & del "C:\Users\Admin\AppData\Local\Temp\windows-update-cve-wfw.exe"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\system32\PING.EXE
          ping 127.0.0.1 -n 10
          3⤵
          • Runs ping.exe
          PID:228
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1308
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\READMEV1.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:1792
    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
      "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /C reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Windows\system32\reg.exe
          reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          3⤵
          • Modifies registry key
          PID:1644
      • C:\Windows\system32\cmd.exe
        cmd /C vssadmin Delete Shadows /All /Quiet
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Windows\system32\vssadmin.exe
          vssadmin Delete Shadows /All /Quiet
          3⤵
          • Interacts with shadow copies
          PID:1888
      • C:\Windows\system32\cmd.exe
        cmd /C "rd /s /q C:\\$RECYCLE.BIN"
        2⤵
          PID:208
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\READMEV1.txt
        1⤵
          PID:1504
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\UmVzdGFydEdyYW50Lnhscw==.lockedv1
          1⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UmVzdGFydEdyYW50Lnhscw==.lockedv1
            2⤵
              PID:1796
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\TmV3TG9jay5tb3Y=.lockedv1
            1⤵
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\TmV3TG9jay5tb3Y=.lockedv1
              2⤵
                PID:276

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Privilege Escalation

            Bypass User Account Control

            1
            T1088

            Defense Evasion

            Bypass User Account Control

            1
            T1088

            Disabling Security Tools

            1
            T1089

            Modify Registry

            2
            T1112

            File Deletion

            2
            T1107

            Virtualization/Sandbox Evasion

            3
            T1497

            Credential Access

            Credentials in Files

            1
            T1081

            Discovery

            File and Directory Discovery

            3
            T1083

            Virtualization/Sandbox Evasion

            3
            T1497

            Remote System Discovery

            1
            T1018

            Collection

            Data from Local System

            1
            T1005

            Impact

            Inhibit System Recovery

            2
            T1490

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
              MD5

              d3715ab62bb922b56fb64b38c3feae8f

              SHA1

              5f3442d9fddc111a8ee3de9e5fe243f259da52c6

              SHA256

              1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

              SHA512

              8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\READMEV1.txt
              MD5

              50262a247e047954224d62aeb1c8779e

              SHA1

              6479fd917fbc31cdca1e38d98d3fb154bb2d8b7d

              SHA256

              455e9b9dfaeda6813dc5be5500057cd7d0aa09e64627fd77843ba75753945242

              SHA512

              5ff02a8d94d0792265554fe6a7394edaf086dc04c39b29eee0b406fe276a21affdfb0a8d6a7a83240c55e1822f265f6c18f5f4018355162d291744b5d441f0a7

            • C:\Users\Admin\Desktop\READMEV1.txt
              MD5

              50262a247e047954224d62aeb1c8779e

              SHA1

              6479fd917fbc31cdca1e38d98d3fb154bb2d8b7d

              SHA256

              455e9b9dfaeda6813dc5be5500057cd7d0aa09e64627fd77843ba75753945242

              SHA512

              5ff02a8d94d0792265554fe6a7394edaf086dc04c39b29eee0b406fe276a21affdfb0a8d6a7a83240c55e1822f265f6c18f5f4018355162d291744b5d441f0a7

            • C:\Users\Admin\Desktop\TmV3TG9jay5tb3Y=.lockedv1
              MD5

              ea4b85c199dce2cabe7163e032594256

              SHA1

              13f780640355926a457f9b231f80a040facd8b35

              SHA256

              40d0251bc29f1da42b01249896593502ffc5a608a90e7a1a35d91e2a4474da05

              SHA512

              b3ab080297b078b4749690e068dfafca271804607adbc9db3ebe31a42b7acd9edcfb94db679b1785d6eeb6e10b4c1f256a7bb9d6c25229ebc06f50e5278d6c01

            • C:\Users\Admin\Desktop\UmVzdGFydEdyYW50Lnhscw==.lockedv1
              MD5

              4aa93eb21f5f7c23e01b61543bf5717b

              SHA1

              f21d764ee17db7aa56e204cf1ad677d1de82eace

              SHA256

              d73b2c148cc82c81f29fc2498a230eb380f8da39e8a557a4b64d34411dc1686e

              SHA512

              4f8542740036232d2b98ecc5b862192e0c5c8151ae87075cf128eef28af210801ee0b3d5fdeb8445e1a69ec86c5d1dd52d9d7ab7d9fc17dc6e4439b70540abde

            • \ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
              MD5

              d3715ab62bb922b56fb64b38c3feae8f

              SHA1

              5f3442d9fddc111a8ee3de9e5fe243f259da52c6

              SHA256

              1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

              SHA512

              8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

            • \ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
              MD5

              d3715ab62bb922b56fb64b38c3feae8f

              SHA1

              5f3442d9fddc111a8ee3de9e5fe243f259da52c6

              SHA256

              1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

              SHA512

              8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

            • \ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
              MD5

              d3715ab62bb922b56fb64b38c3feae8f

              SHA1

              5f3442d9fddc111a8ee3de9e5fe243f259da52c6

              SHA256

              1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

              SHA512

              8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

            • \ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
              MD5

              d3715ab62bb922b56fb64b38c3feae8f

              SHA1

              5f3442d9fddc111a8ee3de9e5fe243f259da52c6

              SHA256

              1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

              SHA512

              8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

            • \ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
              MD5

              d3715ab62bb922b56fb64b38c3feae8f

              SHA1

              5f3442d9fddc111a8ee3de9e5fe243f259da52c6

              SHA256

              1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

              SHA512

              8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

            • \ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\windows-update-CVE-wFW.exe
              MD5

              d3715ab62bb922b56fb64b38c3feae8f

              SHA1

              5f3442d9fddc111a8ee3de9e5fe243f259da52c6

              SHA256

              1fda7a2eeb2478c97b59f75f094c546d585923b286d8d7a52d4afe2795f186e7

              SHA512

              8b7164b2b18d94e1d327fceb858c8d87a2d743bdaa95277e4449788a8e363eca18596490d7fa686501552b7ee273487bb431fb07520e115c67227c8b5507e439

            • memory/208-28-0x0000000000000000-mapping.dmp
            • memory/228-13-0x0000000000000000-mapping.dmp
            • memory/276-32-0x0000000000000000-mapping.dmp
            • memory/396-9-0x0000000000000000-mapping.dmp
            • memory/784-3-0x0000000000400000-0x00000000006E7000-memory.dmp
              Filesize

              2.9MB

            • memory/784-2-0x0000000000400000-0x00000000006E7000-memory.dmp
              Filesize

              2.9MB

            • memory/784-4-0x0000000000400000-0x00000000006E7000-memory.dmp
              Filesize

              2.9MB

            • memory/1260-8-0x0000000000000000-mapping.dmp
            • memory/1424-25-0x0000000000000000-mapping.dmp
            • memory/1644-26-0x0000000000000000-mapping.dmp
            • memory/1700-12-0x0000000000000000-mapping.dmp
            • memory/1760-6-0x0000000000000000-mapping.dmp
            • memory/1780-7-0x0000000000000000-mapping.dmp
            • memory/1796-30-0x0000000000000000-mapping.dmp
            • memory/1848-11-0x000007FEF6A60000-0x000007FEF6CDA000-memory.dmp
              Filesize

              2.5MB

            • memory/1888-27-0x0000000000000000-mapping.dmp
            • memory/1908-5-0x0000000000000000-mapping.dmp
            • memory/2040-23-0x0000000000400000-0x00000000006E7000-memory.dmp
              Filesize

              2.9MB

            • memory/2040-22-0x0000000000400000-0x00000000006E7000-memory.dmp
              Filesize

              2.9MB

            • memory/2044-24-0x0000000000000000-mapping.dmp