Analysis

  • max time kernel
    156s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    26-07-2021 12:40

General

  • Target

    e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c.sample.exe

  • Size

    7KB

  • MD5

    ebbc82f619471384f392efd5c4d05883

  • SHA1

    17d91b45c8615d0f09d1100d2be396cbcba21fde

  • SHA256

    e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c

  • SHA512

    3e33bd22c440e9ab4a065d216467c1220780aa2a39a38ea4aec81d050d3e6048e87244341fbeac2cdefebae9fe987b713e0d4fcf34adf1390b5ccda6dd448241

Score
10/10

Malware Config

Extracted

Path

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\!_READ_ME_!.txt

Ransom Note
Your files are encrypted with RSA-1024 algorithm. To recovery your files you need to buy our decryptor. To buy decrypting tool contact us at: saveinfo89@yahoo.com === BEGIN === AD7D6889 010200000168000000A4000094959FA68FC849B1 D588B4A8BB946B48C8C1F20785D20A609ADA6DA9 C5485641F50A2BB3CCCA0FD4712DB1702CE83D72 E2D6AD414B26ABC41356D000F956E580A000AA12 27D627D7C40D79C20AF94D62587ECA2CE3288754 81B9EA302642A744ED9F4A08DF4062A3A6E3DD8F 4977DBA10ABE5552070316A6DE8DBDDC3D7ED346 === END ===
Emails

saveinfo89@yahoo.com

Signatures

  • Deletes itself 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c.sample.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c.sample.vbs"
      2⤵
      • Deletes itself
      PID:1532

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c.sample.vbs
    MD5

    aadec5d9ed737fb7491d58088cf11345

    SHA1

    caaed15d7bbd693020a7dcf4a6a9866c17c6d8d9

    SHA256

    c8d7e47fcb3a4345202f7ef3fd0db90eb1a1b9cab44e91a9befab3ec3dfa6476

    SHA512

    abfdde6d7176384b5f5a92a1373f8ae41789f8a3d1d88313d1c85bd742e4d824a203430db2efa2a09bd6c43595219cf2dfdd00281de68c001fa62bc70cafb1ac

  • memory/1532-61-0x0000000000000000-mapping.dmp
  • memory/1708-60-0x00000000762C1000-0x00000000762C3000-memory.dmp
    Filesize

    8KB