Analysis

  • max time kernel
    111s
  • max time network
    120s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    10/06/2021, 11:22

General

  • Target

    svchosts.exe

  • Size

    13KB

  • MD5

    43859f9a480451304b2efb0e2bc5ba72

  • SHA1

    c05a69cfa4bede3a58f48ff09de4f49aa988faee

  • SHA256

    17ba67b2b5ec20c5fec06a580e293eefc665fc89f8bfc00d6b9b715bffa2d845

  • SHA512

    22e3da706a0b5e4e360c97f3bc80c4ab55e4ffff62aab92adc13e5c2ee2d06f93178504049a3a620a88d30c57b7cf3a53c9ef9166804a1115c4b821f9d092afe

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-1594587808-2047097707-2163810515-1000\#Decrypt#.txt

Ransom Note
Hello my dear friend! All your files have been encrypted due to a security problem with your PC! If you want to restore them, install ICQ software on your PC https://icq.com/windows/ or on your mobile phone search in Appstore / Google market ICQ Write to our ICQ @xhamster2020 https://icq.im/xhamster2020 Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Price depends on how fast you contact us. We give all guarantees of your files decryption. IF WE DONT SEE MESSAGE FROM YOU IN 48 HOURS - ALL IMPORTANT INFORMATION FROM YOUR SERVERS (DATABASES, COMPANY DOCUMENTS, ACCESS DATA ETC) WILL BE UPLOADED TO THE DARKNET tell your unique ID 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
URLs

https://icq.com/windows/

https://icq.im/xhamster2020

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 33 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchosts.exe
    "C:\Users\Admin\AppData\Local\Temp\svchosts.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\System32\vssadmin.exe
      delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:1900
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {current} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:3664
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} recoveryenabled no
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:188
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {current} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1504
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c netsh advfirewall set allprofiles state off
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\system32\netsh.exe
        netsh advfirewall set allprofiles state off
        3⤵
          PID:3444
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\svchosts.exe" >> NUL
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          3⤵
          • Delays execution with timeout.exe
          PID:280
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:696

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads