Analysis

  • max time kernel
    68s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    10/06/2021, 11:22

General

  • Target

    svchosts.exe

  • Size

    13KB

  • MD5

    43859f9a480451304b2efb0e2bc5ba72

  • SHA1

    c05a69cfa4bede3a58f48ff09de4f49aa988faee

  • SHA256

    17ba67b2b5ec20c5fec06a580e293eefc665fc89f8bfc00d6b9b715bffa2d845

  • SHA512

    22e3da706a0b5e4e360c97f3bc80c4ab55e4ffff62aab92adc13e5c2ee2d06f93178504049a3a620a88d30c57b7cf3a53c9ef9166804a1115c4b821f9d092afe

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\#Decrypt#.txt

Ransom Note
Hello my dear friend! All your files have been encrypted due to a security problem with your PC! If you want to restore them, install ICQ software on your PC https://icq.com/windows/ or on your mobile phone search in Appstore / Google market ICQ Write to our ICQ @xhamster2020 https://icq.im/xhamster2020 Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Price depends on how fast you contact us. We give all guarantees of your files decryption. IF WE DONT SEE MESSAGE FROM YOU IN 48 HOURS - ALL IMPORTANT INFORMATION FROM YOUR SERVERS (DATABASES, COMPANY DOCUMENTS, ACCESS DATA ETC) WILL BE UPLOADED TO THE DARKNET tell your unique ID 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
URLs

https://icq.com/windows/

https://icq.im/xhamster2020

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 41 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchosts.exe
    "C:\Users\Admin\AppData\Local\Temp\svchosts.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\system32\vssadmin.exe
      delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:2004
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {current} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1792
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} recoveryenabled no
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {current} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1708
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c netsh advfirewall set allprofiles state off
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\system32\netsh.exe
        netsh advfirewall set allprofiles state off
        3⤵
          PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\svchosts.exe" >> NUL
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1628
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          3⤵
          • Delays execution with timeout.exe
          PID:1900
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1772
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\#Decrypt#.txt
      1⤵
        PID:552
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x4f8
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:216

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/540-60-0x0000000075A71000-0x0000000075A73000-memory.dmp

        Filesize

        8KB

      • memory/1776-68-0x000007FEFB9A1000-0x000007FEFB9A3000-memory.dmp

        Filesize

        8KB