Analysis

  • max time kernel
    83s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12/02/2021, 08:41

General

  • Target

    ___________.exe

  • Size

    48KB

  • MD5

    221f1b97cd8e9766bebd001960b31dc4

  • SHA1

    4c3367638ffca90ae5eb5a644a9beaec1853f36c

  • SHA256

    a5f47b1b2efcf8bd7e36a072941fb9ee0ce780e6f410d6c85c503ccea24d29e6

  • SHA512

    7e86b0fc428b8fc97251eb0bf2639b2c780d7a45b730b475794107312e6edd963355aca59c8eee34380800006531a8dbeae152f3542291f0c3154c0d1fbb96d6

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\info.hta

Ransom Note
🔒 ALL YOUR DATA TURNED TO USELESS BINARY CODE 🔒 Your computer is infected with a virus. Send an email [email protected] , specify in the subject your unique identifier MEPU7S61 and you will definitly be helped to recover. NOTE: You can send 2 files as proof that we can return all your data. If the provided email doesn't work, please contact us at [email protected] Algorithms used are AES and RSA. IMPORTANT: 1. The infection was due to vulnerabilities in your software. 2. If you want to make sure that it is impossible to recover files using third-party software, do this not on all files, otherwise you may lose all data. 3. Only communication through our email can guarantee file recover for you. We are not responsible for the actions of third parties who promise to help you - most often they are scammers. 4. Please, do not try to rename encrypted files. 5. Our goal is to return your data, but if you don't contact us, we will not succeed.

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\___________.exe
    "C:\Users\Admin\AppData\Local\Temp\___________.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4696
    • \??\c:\windows\system32\cmstp.exe
      "c:\windows\system32\cmstp.exe" /au C:\Windows\temp\1i1ug1lr.inf
      2⤵
        PID:4980
    • C:\Windows\system32\cmd.exe
      cmd /c start C:\Windows\temp\24kzbgji.exe
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\temp\24kzbgji.exe
        C:\Windows\temp\24kzbgji.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Users\Admin\AppData\Roaming\91.exe
          "C:\Users\Admin\AppData\Roaming\91.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4620
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin.exe delete shadows /all /quiet
              5⤵
              • Interacts with shadow copies
              PID:1356
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
            4⤵
              PID:200
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4608
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3036
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3744
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin.exe delete shadows /all /quiet
                5⤵
                • Interacts with shadow copies
                PID:4108
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3436
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5012
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
              4⤵
                PID:4728
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:68
                • C:\Windows\SysWOW64\vssadmin.exe
                  vssadmin.exe delete shadows /all /quiet
                  5⤵
                  • Interacts with shadow copies
                  PID:1460
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3164
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  wmic shadowcopy delete
                  5⤵
                    PID:2476
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                  4⤵
                    PID:3136
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                    4⤵
                      PID:732
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Roaming\91.exe"
                      4⤵
                        PID:1772
                        • C:\Windows\SysWOW64\choice.exe
                          choice /C Y /N /D Y /T 1
                          5⤵
                            PID:4144
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Windows\temp\24kzbgji.exe"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1416
                        • C:\Windows\SysWOW64\choice.exe
                          choice /C Y /N /D Y /T 1
                          4⤵
                            PID:1684
                    • C:\Windows\system32\taskkill.exe
                      taskkill /IM cmstp.exe /F
                      1⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3164
                    • C:\Windows\system32\vssvc.exe
                      C:\Windows\system32\vssvc.exe
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2056

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1120-26-0x0000000005100000-0x0000000005101000-memory.dmp

                      Filesize

                      4KB

                    • memory/1120-28-0x00000000052F0000-0x00000000052F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1120-29-0x0000000002C90000-0x0000000002C91000-memory.dmp

                      Filesize

                      4KB

                    • memory/1120-24-0x00000000056D0000-0x00000000056D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1120-21-0x0000000073430000-0x0000000073B1E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/1120-22-0x00000000008B0000-0x00000000008B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2248-16-0x0000000000250000-0x0000000000251000-memory.dmp

                      Filesize

                      4KB

                    • memory/2248-15-0x0000000073430000-0x0000000073B1E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/4696-11-0x0000000000EE4000-0x0000000000EE6000-memory.dmp

                      Filesize

                      8KB

                    • memory/4696-3-0x00000000006F0000-0x00000000006F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4696-9-0x0000000000EE0000-0x0000000000EE2000-memory.dmp

                      Filesize

                      8KB

                    • memory/4696-10-0x0000000000EE2000-0x0000000000EE4000-memory.dmp

                      Filesize

                      8KB

                    • memory/4696-2-0x00007FFCF28D0000-0x00007FFCF32BC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/4980-7-0x000001C5495F0000-0x000001C5495F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/4980-8-0x000001C5495F0000-0x000001C5496F1000-memory.dmp

                      Filesize

                      1.0MB