Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    30/04/2021, 18:49

General

  • Target

    c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe

  • Size

    142KB

  • MD5

    f568229e696c0e82abb35ec73d162d5e

  • SHA1

    71889fdf2d7616f366c38072ef3d24b021068ab8

  • SHA256

    c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323

  • SHA512

    7dabdd3526e9b5d5ba4055e15455ed7a87706c534be2784cf85e70e89249aeada3a3e4480c6896220431fb131aa85a5538100d928087bacb3ae64f3643cea23e

Score
10/10

Malware Config

Extracted

Path

C:\MSOCache\DECRYPT_NOTE.txt

Ransom Note
Hello THE AKA GROUP Your network was hacked! Files are encrypted by HellKitty! Data from your servers was dumped! At now this incident is a secret! To resolve this situation and decrypt files please contact us using TOR browser (https://www.torproject.org/) and your personal contact link in TOR network below. We will wait contact us within the next 3 days. In case of your disregard, we reserve the right to dispose of the dumped data at our discretion including publishing. IMPORTANT: Don't modify encrypted files or you can damage them and decryption will be impossible! Sorry for the inconvenience, it just business. Best Regards. Personal contact link: http://decrypts3nln3tic.onion/secret/53102f60dbbcb5765639504eab5da0341cbfd232e31d00a639adf9512bc1c487
URLs

http://decrypts3nln3tic.onion/secret/53102f60dbbcb5765639504eab5da0341cbfd232e31d00a639adf9512bc1c487

Signatures

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    PID:368
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1232
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\WriteInstall.wmf.crypt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\WriteInstall.wmf.crypt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:1596
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\DECRYPT_NOTE.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1340
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Documents\DECRYPT_NOTE.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:472
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\DECRYPT_NOTE.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:752
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Documents\DECRYPT_NOTE.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-59-0x0000000076661000-0x0000000076663000-memory.dmp

    Filesize

    8KB

  • memory/1424-60-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmp

    Filesize

    8KB