Analysis

  • max time kernel
    151s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-01-2021 13:57

General

  • Target

    Photo-064-2021.jpg.scr

  • Size

    126KB

  • MD5

    ea4cf6019062e5555d81bb5510d79b3d

  • SHA1

    0d95aa8ade975b9f85c54cdbabd08906a01e51ee

  • SHA256

    9a02671ffb82ee83b8f9afd028af3090ecd494bd7d8d7a2e2cc75f0ac187c3b8

  • SHA512

    8f1eb4eb9dd561faf05094552bf6769bbfb614de1c7c96cc568e7f45b22fdcdf7d7d7b518041e1ab15b9781ba85dca69c19b9a75cc85bd4aeea3e0540d9f17c9

Malware Config

Extracted

Path

C:\WERE_MY _FILES.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ------------------------------------------------ create a ticket to any of these addresses yip.su/2QstD5 cutt.ly/0htT0he shorturl.at/GOY24 bit.ly/3399Ozf ------------------------------------------------ you can also attach a small cryptted file for a free test decrypt Additional communication method ------------------------------- 1. Download Tor browser - httpps://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://helpqvrg3cc5mvb3.onion/ -------------------------------- You ID ����������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��������������
URLs

httpps://www.torproject.org/

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 29 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 5320 IoCs
  • Delays execution with timeout.exe 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 73 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Photo-064-2021.jpg.scr
    "C:\Users\Admin\AppData\Local\Temp\Photo-064-2021.jpg.scr" /S
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\swhost.exe
      "C:\Users\Admin\AppData\Local\Temp\swhost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1856
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1008
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1048
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1264
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
        3⤵
        • Modifies extensions of user files
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Drops file in Program Files directory
        • Suspicious behavior: RenamesItself
        PID:1844
    • C:\Users\Admin\AppData\Local\Temp\smhost.exe
      "C:\Users\Admin\AppData\Local\Temp\smhost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:572
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:936
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1652
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:1448
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
        3⤵
          PID:1188

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\smhost.exe

      MD5

      654e98d30719de2b197311aadece41d2

      SHA1

      e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd

      SHA256

      b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26

      SHA512

      ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4

    • C:\Users\Admin\AppData\Local\Temp\smhost.exe

      MD5

      654e98d30719de2b197311aadece41d2

      SHA1

      e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd

      SHA256

      b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26

      SHA512

      ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4

    • C:\Users\Admin\AppData\Local\Temp\swhost.exe

      MD5

      9e96c9967287f92f1646c0c8a68f3a48

      SHA1

      53401dab53f27cab59e5e2f2e2d7d8bfa3699744

      SHA256

      b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b

      SHA512

      1acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924

    • C:\Users\Admin\AppData\Local\Temp\swhost.exe

      MD5

      9e96c9967287f92f1646c0c8a68f3a48

      SHA1

      53401dab53f27cab59e5e2f2e2d7d8bfa3699744

      SHA256

      b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b

      SHA512

      1acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924

    • \Users\Admin\AppData\Local\Temp\smhost.exe

      MD5

      654e98d30719de2b197311aadece41d2

      SHA1

      e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd

      SHA256

      b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26

      SHA512

      ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4

    • \Users\Admin\AppData\Local\Temp\smhost.exe

      MD5

      654e98d30719de2b197311aadece41d2

      SHA1

      e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd

      SHA256

      b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26

      SHA512

      ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4

    • \Users\Admin\AppData\Local\Temp\swhost.exe

      MD5

      9e96c9967287f92f1646c0c8a68f3a48

      SHA1

      53401dab53f27cab59e5e2f2e2d7d8bfa3699744

      SHA256

      b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b

      SHA512

      1acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924

    • \Users\Admin\AppData\Local\Temp\swhost.exe

      MD5

      9e96c9967287f92f1646c0c8a68f3a48

      SHA1

      53401dab53f27cab59e5e2f2e2d7d8bfa3699744

      SHA256

      b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b

      SHA512

      1acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924

    • memory/528-42-0x0000000000400000-0x0000000000401000-memory.dmp

      Filesize

      4KB

    • memory/528-15-0x0000000000000000-mapping.dmp

    • memory/528-22-0x00000000006C0000-0x00000000006E2000-memory.dmp

      Filesize

      136KB

    • memory/528-18-0x00000000741E0000-0x00000000748CE000-memory.dmp

      Filesize

      6.9MB

    • memory/528-19-0x0000000001380000-0x0000000001381000-memory.dmp

      Filesize

      4KB

    • memory/572-24-0x0000000000000000-mapping.dmp

    • memory/868-2-0x00000000741E0000-0x00000000748CE000-memory.dmp

      Filesize

      6.9MB

    • memory/868-3-0x0000000000330000-0x0000000000331000-memory.dmp

      Filesize

      4KB

    • memory/932-23-0x0000000000000000-mapping.dmp

    • memory/936-25-0x0000000000000000-mapping.dmp

    • memory/1008-27-0x0000000000000000-mapping.dmp

    • memory/1048-31-0x0000000000000000-mapping.dmp

    • memory/1188-38-0x000000000040801E-mapping.dmp

    • memory/1188-35-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1188-41-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1188-40-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1264-34-0x0000000000000000-mapping.dmp

    • memory/1376-32-0x0000000000000000-mapping.dmp

    • memory/1448-33-0x0000000000000000-mapping.dmp

    • memory/1616-28-0x0000000000000000-mapping.dmp

    • memory/1636-10-0x00000000741E0000-0x00000000748CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1636-7-0x0000000000000000-mapping.dmp

    • memory/1636-43-0x0000000000400000-0x0000000000402000-memory.dmp

      Filesize

      8KB

    • memory/1636-11-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/1636-21-0x0000000000370000-0x0000000000398000-memory.dmp

      Filesize

      160KB

    • memory/1652-30-0x0000000000000000-mapping.dmp

    • memory/1776-29-0x0000000000000000-mapping.dmp

    • memory/1844-37-0x0000000000409F20-mapping.dmp

    • memory/1844-39-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1844-36-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1856-26-0x0000000000000000-mapping.dmp