Analysis

  • max time kernel
    142s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-01-2021 13:57

General

  • Target

    Photo-064-2021.jpg.scr

  • Size

    126KB

  • MD5

    ea4cf6019062e5555d81bb5510d79b3d

  • SHA1

    0d95aa8ade975b9f85c54cdbabd08906a01e51ee

  • SHA256

    9a02671ffb82ee83b8f9afd028af3090ecd494bd7d8d7a2e2cc75f0ac187c3b8

  • SHA512

    8f1eb4eb9dd561faf05094552bf6769bbfb614de1c7c96cc568e7f45b22fdcdf7d7d7b518041e1ab15b9781ba85dca69c19b9a75cc85bd4aeea3e0540d9f17c9

Malware Config

Extracted

Path

C:\WERE_MY _FILES.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ------------------------------------------------ create a ticket to any of these addresses yip.su/2QstD5 cutt.ly/0htT0he shorturl.at/GOY24 bit.ly/3399Ozf ------------------------------------------------ you can also attach a small cryptted file for a free test decrypt Additional communication method ------------------------------- 1. Download Tor browser - httpps://www.torproject.org/ 2. Install Tor browser 3. Open Tor Browser 4. Open link in TOR browser: http://helpqvrg3cc5mvb3.onion/ -------------------------------- You ID ����������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��������������
URLs

httpps://www.torproject.org/

http://helpqvrg3cc5mvb3.onion/

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 28 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 18481 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 2 IoCs
  • Delays execution with timeout.exe 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Photo-064-2021.jpg.scr
    "C:\Users\Admin\AppData\Local\Temp\Photo-064-2021.jpg.scr" /S
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Users\Admin\AppData\Local\Temp\swhost.exe
      "C:\Users\Admin\AppData\Local\Temp\swhost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:212
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:3620
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:3912
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
        3⤵
        • Modifies extensions of user files
        • Drops desktop.ini file(s)
        • Drops file in Program Files directory
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:3188
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe > nul
          4⤵
            PID:4056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 1676
          3⤵
          • Drops file in Windows directory
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2868
      • C:\Users\Admin\AppData\Local\Temp\smhost.exe
        "C:\Users\Admin\AppData\Local\Temp\smhost.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout 1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2484
          • C:\Windows\SysWOW64\timeout.exe
            timeout 1
            4⤵
            • Delays execution with timeout.exe
            PID:196
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout 1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Windows\SysWOW64\timeout.exe
            timeout 1
            4⤵
            • Delays execution with timeout.exe
            PID:4092
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout 1
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3724
          • C:\Windows\SysWOW64\timeout.exe
            timeout 1
            4⤵
            • Delays execution with timeout.exe
            PID:3292
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
          3⤵
            PID:496
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
            3⤵
              PID:2816
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 1604
              3⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2260

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini

          MD5

          af2583b628a62640d1f4bfdf2075863a

          SHA1

          cafe9a9d2deedb443d52a93a45e99a385e4f65f2

          SHA256

          e8a664c32b08dfaa11ee755ac9a5890214029395eff64ee009366c8cbf8cf3d4

          SHA512

          13a771b634b726fe2b5b71886b4c7875ca4ab6e2d0061074a1d66bd98f555c72cf43349ff1ab9de2166ca261851950e266b67a74995bd21efac37addc4c04688

        • C:\Users\Admin\AppData\Local\Temp\smhost.exe

          MD5

          654e98d30719de2b197311aadece41d2

          SHA1

          e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd

          SHA256

          b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26

          SHA512

          ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4

        • C:\Users\Admin\AppData\Local\Temp\smhost.exe

          MD5

          654e98d30719de2b197311aadece41d2

          SHA1

          e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd

          SHA256

          b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26

          SHA512

          ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4

        • C:\Users\Admin\AppData\Local\Temp\swhost.exe

          MD5

          9e96c9967287f92f1646c0c8a68f3a48

          SHA1

          53401dab53f27cab59e5e2f2e2d7d8bfa3699744

          SHA256

          b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b

          SHA512

          1acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924

        • C:\Users\Admin\AppData\Local\Temp\swhost.exe

          MD5

          9e96c9967287f92f1646c0c8a68f3a48

          SHA1

          53401dab53f27cab59e5e2f2e2d7d8bfa3699744

          SHA256

          b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b

          SHA512

          1acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924

        • memory/196-44-0x0000000000000000-mapping.dmp

        • memory/212-43-0x0000000000000000-mapping.dmp

        • memory/764-50-0x0000000000000000-mapping.dmp

        • memory/2084-45-0x0000000000000000-mapping.dmp

        • memory/2092-46-0x0000000000000000-mapping.dmp

        • memory/2260-58-0x0000000004950000-0x0000000004951000-memory.dmp

          Filesize

          4KB

        • memory/2484-41-0x0000000000000000-mapping.dmp

        • memory/2488-42-0x0000000000000000-mapping.dmp

        • memory/2816-56-0x000000000040801E-mapping.dmp

        • memory/2816-54-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2868-59-0x0000000004E10000-0x0000000004E11000-memory.dmp

          Filesize

          4KB

        • memory/3152-23-0x0000000000F40000-0x0000000000F41000-memory.dmp

          Filesize

          4KB

        • memory/3152-19-0x0000000000000000-mapping.dmp

        • memory/3152-40-0x0000000005C20000-0x0000000005C48000-memory.dmp

          Filesize

          160KB

        • memory/3152-22-0x00000000733D0000-0x0000000073ABE000-memory.dmp

          Filesize

          6.9MB

        • memory/3152-37-0x0000000005A60000-0x0000000005A61000-memory.dmp

          Filesize

          4KB

        • memory/3160-13-0x0000000007260000-0x0000000007261000-memory.dmp

          Filesize

          4KB

        • memory/3160-5-0x0000000005200000-0x0000000005201000-memory.dmp

          Filesize

          4KB

        • memory/3160-11-0x0000000006830000-0x0000000006831000-memory.dmp

          Filesize

          4KB

        • memory/3160-2-0x00000000733D0000-0x0000000073ABE000-memory.dmp

          Filesize

          6.9MB

        • memory/3160-10-0x0000000006130000-0x0000000006131000-memory.dmp

          Filesize

          4KB

        • memory/3160-16-0x0000000006760000-0x0000000006761000-memory.dmp

          Filesize

          4KB

        • memory/3160-14-0x0000000006420000-0x0000000006421000-memory.dmp

          Filesize

          4KB

        • memory/3160-15-0x00000000063A0000-0x00000000063A1000-memory.dmp

          Filesize

          4KB

        • memory/3160-9-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

          Filesize

          4KB

        • memory/3160-3-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/3160-8-0x0000000004C70000-0x0000000004C71000-memory.dmp

          Filesize

          4KB

        • memory/3160-7-0x0000000004C30000-0x0000000004C31000-memory.dmp

          Filesize

          4KB

        • memory/3160-6-0x0000000002650000-0x0000000002651000-memory.dmp

          Filesize

          4KB

        • memory/3160-12-0x0000000006300000-0x0000000006301000-memory.dmp

          Filesize

          4KB

        • memory/3160-17-0x0000000006EB0000-0x0000000006EB1000-memory.dmp

          Filesize

          4KB

        • memory/3160-18-0x0000000006FA0000-0x0000000006FA1000-memory.dmp

          Filesize

          4KB

        • memory/3188-57-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/3188-53-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/3188-55-0x0000000000409F20-mapping.dmp

        • memory/3292-51-0x0000000000000000-mapping.dmp

        • memory/3400-29-0x00000000733D0000-0x0000000073ABE000-memory.dmp

          Filesize

          6.9MB

        • memory/3400-39-0x0000000004B00000-0x0000000004B22000-memory.dmp

          Filesize

          136KB

        • memory/3400-31-0x0000000000010000-0x0000000000011000-memory.dmp

          Filesize

          4KB

        • memory/3400-24-0x0000000000000000-mapping.dmp

        • memory/3620-48-0x0000000000000000-mapping.dmp

        • memory/3724-49-0x0000000000000000-mapping.dmp

        • memory/3912-52-0x0000000000000000-mapping.dmp

        • memory/4056-61-0x0000000000000000-mapping.dmp

        • memory/4092-47-0x0000000000000000-mapping.dmp