Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-02-2021 07:19

General

  • Target

    d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1.exe

  • Size

    271KB

  • MD5

    f8ca42285e4979fc25e1e358aaaf3ee3

  • SHA1

    83bb7336deceeb094574714c1043ce9d3d420ee8

  • SHA256

    d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1

  • SHA512

    00bddc7a539b957f9dfb74941c56bab532221f4783d1ec90bde4019b9af68a79886d36d2e12fd9511836a8447cbecd56ee4a988b1e0dd6c6dc170b9c60b20a54

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: threesixnine@ctemplar.com and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: threesixnine@ctemplar.com Your personal ID: 82E-43B-05A Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Emails

threesixnine@ctemplar.com

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1.exe
    "C:\Users\Admin\AppData\Local\Temp\d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1592
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
        3⤵
          PID:1816
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
          3⤵
            PID:600
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:940
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:916
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1460
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic shadowcopy delete
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1844
            • C:\Windows\SysWOW64\vssadmin.exe
              vssadmin delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:744
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 0
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            PID:1304
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
            3⤵
              PID:1748
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe
            2⤵
            • Deletes itself
            PID:1500
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
            PID:1956

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          File Deletion

          2
          T1107

          Modify Registry

          2
          T1112

          Install Root Certificate

          1
          T1130

          Discovery

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          2
          T1082

          Command and Control

          Web Service

          1
          T1102

          Impact

          Inhibit System Recovery

          2
          T1490

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
            MD5

            d8b0ff3ef0cac177c2f16157834442b1

            SHA1

            83504ee29a466c5b6412b7e72c131cd8f975d536

            SHA256

            667366e5abac32446a226d1cfaef36ebd721bf00334e26b984b477f5c146789c

            SHA512

            5dafefa8e8677369dca0241512b8b6667f14595770b2f2f1ea7b7ee1717b70f42079c85b1edcea4a45f6fd4896b7a0040264d9b1f63188aba2dd0e5bc25a7eea

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
            MD5

            c105de5d82dc4fa359f03f82cb0bf797

            SHA1

            78ec4e7c84b5b941c6ef4814d7eab379d2a7a12b

            SHA256

            ada540f3499dc0ec44782e7b52f064fc3ae96159a98d34f130deed0fa1dc8ccc

            SHA512

            c9251ad48cda6ea6b455f99e162040cecdc934eb73f0bda14ad8c32b0458119f0f90f509da942207d87618933dbe3555cfc414d116f7be9d8eb54b259d583e07

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
            MD5

            e92176b0889cc1bb97114beb2f3c1728

            SHA1

            ad1459d390ec23ab1c3da73ff2fbec7fa3a7f443

            SHA256

            58a4f38ba43f115ba3f465c311eaaf67f43d92e580f7f153de3ab605fc9900f3

            SHA512

            cd2267ba2f08d2f87538f5b4f8d3032638542ac3476863a35f0df491eb3a84458ce36c06e8c1bd84219f5297b6f386748e817945a406082fa8e77244ec229d8f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
            MD5

            c8f5dcc04731e23047a7e0609731c468

            SHA1

            5f4b7ec761c1d2f3a24417c06e20619216a9678e

            SHA256

            de35f9bd437d0839a51b5c3cb5c4e2d6c6f586e703b99bfe63e60bea054b0a97

            SHA512

            2ca4ab3cd0937f82d6e2eecbd9a21c4fc1a73ec1f19dcc8b635ad96b0cbf25383b3e2a552b9f20b59ef671af6c20f21bfcca99b48733f6bd3a9ebf140ac22caa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
            MD5

            a9bc6e2ca20ae5ea99d0575653497770

            SHA1

            b0c94bd1c061824afafc8cc126c6147790a34853

            SHA256

            d24361630c7a14af147aee884d9f56f8b28a3936eac84f96065f8fda00ffed15

            SHA512

            83c3c8e1fce70dd9b477e36e107459ac01daa31e460b5aa092748b0528b6e1e35023ffaead4b9ac27905d056b2750966d2c05ead4a9a3ec52e1e90a4a8ff6dd1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
            MD5

            c1ec00a6144fa3c6ac2b6b6cc28cd44e

            SHA1

            b3b8663767dbeb03114c4ad28689451f2dc7d834

            SHA256

            b1a2f7b261f2646417b55193c691915e296f19a1c8f0e571168b21183133a243

            SHA512

            3deb0c5d1700d638b95101c8e9f2cfae70b2d59e7dde2621c50035e0ed6f0ad525e112c0be2b92bb2825a0390d96c3665cafcdc05ca2e561a31814bb56327f2a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
            MD5

            f6f83cd3e7be9adc584c57b9d3a350a1

            SHA1

            7af9b75a531ed1903a34943f275c797e4fde6ce3

            SHA256

            2debfb5aac9299c4c1702fd73604cff2231ac3a8dd512681ceab59da89294ec4

            SHA512

            f66ad747d9f2b257066ebea75d3cf023ee5d61bab2ef1970f6967290caf53d98fe79421f860d292d70f8c04c2438524d9524187c88a4489e99e0a551898fda59

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
            MD5

            e504925e5ba810682cfea154499eec62

            SHA1

            f3f15f8f07ca781d718c88f7088b76e22063e30c

            SHA256

            29b91af48883fc17814405b93e99e461238b8620070c5b73d464d086ec1d7734

            SHA512

            36910237990a284caff9486943cb5c77abb93f75a74093822502c2156c317a95fccadb0d2f989c345e1cb9e1cbe2cca30f4c8b4e1ce937451b5d11a85e96692c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\QMFEPFPV.htm
            MD5

            b1cd7c031debba3a5c77b39b6791c1a7

            SHA1

            e5d91e14e9c685b06f00e550d9e189deb2075f76

            SHA256

            57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

            SHA512

            d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O1R1CL99\5DZGALCF.htm
            MD5

            6b17a59cec1a7783febae9aa55c56556

            SHA1

            01d4581e2b3a6348679147a915a0b22b2a66643a

            SHA256

            66987b14b90d41632be98836f9601b12e7f329ffab05595887889c9c5716fbeb

            SHA512

            3337efd12b9c06b7768eb928a78caae243b75257c5aabe7a49e908a2f735af55f7257a40bd2330dc13865ead18ed805b54a6c5105740fdcbbaccacf7997bcbc3

          • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
            MD5

            ef572e2c7b1bbd57654b36e8dcfdc37a

            SHA1

            b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

            SHA256

            e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

            SHA512

            b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
            MD5

            f8ca42285e4979fc25e1e358aaaf3ee3

            SHA1

            83bb7336deceeb094574714c1043ce9d3d420ee8

            SHA256

            d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1

            SHA512

            00bddc7a539b957f9dfb74941c56bab532221f4783d1ec90bde4019b9af68a79886d36d2e12fd9511836a8447cbecd56ee4a988b1e0dd6c6dc170b9c60b20a54

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
            MD5

            f8ca42285e4979fc25e1e358aaaf3ee3

            SHA1

            83bb7336deceeb094574714c1043ce9d3d420ee8

            SHA256

            d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1

            SHA512

            00bddc7a539b957f9dfb74941c56bab532221f4783d1ec90bde4019b9af68a79886d36d2e12fd9511836a8447cbecd56ee4a988b1e0dd6c6dc170b9c60b20a54

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
            MD5

            f8ca42285e4979fc25e1e358aaaf3ee3

            SHA1

            83bb7336deceeb094574714c1043ce9d3d420ee8

            SHA256

            d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1

            SHA512

            00bddc7a539b957f9dfb74941c56bab532221f4783d1ec90bde4019b9af68a79886d36d2e12fd9511836a8447cbecd56ee4a988b1e0dd6c6dc170b9c60b20a54

          • \Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
            MD5

            f8ca42285e4979fc25e1e358aaaf3ee3

            SHA1

            83bb7336deceeb094574714c1043ce9d3d420ee8

            SHA256

            d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1

            SHA512

            00bddc7a539b957f9dfb74941c56bab532221f4783d1ec90bde4019b9af68a79886d36d2e12fd9511836a8447cbecd56ee4a988b1e0dd6c6dc170b9c60b20a54

          • \Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
            MD5

            f8ca42285e4979fc25e1e358aaaf3ee3

            SHA1

            83bb7336deceeb094574714c1043ce9d3d420ee8

            SHA256

            d76782960590abc182dba8fdcdc8bfb121b13d36be2d5d8b0960fb67960e89b1

            SHA512

            00bddc7a539b957f9dfb74941c56bab532221f4783d1ec90bde4019b9af68a79886d36d2e12fd9511836a8447cbecd56ee4a988b1e0dd6c6dc170b9c60b20a54

          • memory/544-2-0x00000000008E0000-0x00000000008F1000-memory.dmp
            Filesize

            68KB

          • memory/544-3-0x0000000076881000-0x0000000076883000-memory.dmp
            Filesize

            8KB

          • memory/544-4-0x00000000003C0000-0x00000000003F7000-memory.dmp
            Filesize

            220KB

          • memory/544-5-0x0000000000400000-0x0000000000541000-memory.dmp
            Filesize

            1.3MB

          • memory/600-33-0x0000000000000000-mapping.dmp
          • memory/744-43-0x0000000000000000-mapping.dmp
          • memory/916-41-0x0000000000000000-mapping.dmp
          • memory/940-34-0x0000000000000000-mapping.dmp
          • memory/968-16-0x0000000000B40000-0x0000000000B51000-memory.dmp
            Filesize

            68KB

          • memory/968-21-0x0000000000400000-0x0000000000541000-memory.dmp
            Filesize

            1.3MB

          • memory/968-9-0x0000000000000000-mapping.dmp
          • memory/1304-44-0x0000000000B80000-0x0000000000B91000-memory.dmp
            Filesize

            68KB

          • memory/1304-38-0x0000000000000000-mapping.dmp
          • memory/1460-35-0x0000000000000000-mapping.dmp
          • memory/1480-6-0x000007FEF7EB0000-0x000007FEF812A000-memory.dmp
            Filesize

            2.5MB

          • memory/1500-12-0x0000000000000000-mapping.dmp
          • memory/1500-11-0x00000000000A0000-0x00000000000A1000-memory.dmp
            Filesize

            4KB

          • memory/1592-36-0x0000000000000000-mapping.dmp
          • memory/1684-30-0x0000000000000000-mapping.dmp
          • memory/1748-32-0x0000000000000000-mapping.dmp
          • memory/1816-31-0x0000000000000000-mapping.dmp
          • memory/1844-42-0x0000000000000000-mapping.dmp