Analysis
-
max time kernel
20s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30/04/2021, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe
Resource
win10v20210408
General
-
Target
c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe
-
Size
142KB
-
MD5
f568229e696c0e82abb35ec73d162d5e
-
SHA1
71889fdf2d7616f366c38072ef3d24b021068ab8
-
SHA256
c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323
-
SHA512
7dabdd3526e9b5d5ba4055e15455ed7a87706c534be2784cf85e70e89249aeada3a3e4480c6896220431fb131aa85a5538100d928087bacb3ae64f3643cea23e
Malware Config
Extracted
C:\odt\DECRYPT_NOTE.txt
http://decrypts3nln3tic.onion/secret/53102f60dbbcb5765639504eab5da0341cbfd232e31d00a639adf9512bc1c487
Signatures
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CopyRemove.tif => C:\Users\Admin\Pictures\CopyRemove.tif.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\SendRename.tiff => C:\Users\Admin\Pictures\SendRename.tiff.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\LockHide.crw => C:\Users\Admin\Pictures\LockHide.crw.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\UpdateRegister.png => C:\Users\Admin\Pictures\UpdateRegister.png.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\SyncExport.tiff => C:\Users\Admin\Pictures\SyncExport.tiff.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\SendRename.tiff c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\ApproveWait.crw => C:\Users\Admin\Pictures\ApproveWait.crw.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\InitializeConvert.tif => C:\Users\Admin\Pictures\InitializeConvert.tif.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\InstallSearch.png => C:\Users\Admin\Pictures\InstallSearch.png.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\ImportSubmit.crw => C:\Users\Admin\Pictures\ImportSubmit.crw.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\SplitRead.raw => C:\Users\Admin\Pictures\SplitRead.raw.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\SyncExport.tiff c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe File renamed C:\Users\Admin\Pictures\DisableMove.tif => C:\Users\Admin\Pictures\DisableMove.tif.crypt c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 624 c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe 624 c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3212 vssvc.exe Token: SeRestorePrivilege 3212 vssvc.exe Token: SeAuditPrivilege 3212 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\c2498845ed4b287fd0f95528926c8ee620ef0cbb5b27865b2007d6379ffe4323.bin.sample.exe"1⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
PID:624
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3212