Analysis

  • max time kernel
    161s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    26-07-2021 12:58

General

  • Target

    33223ddfd3805727e70265d1b9ad22207a5667c6e38b802a140d979927e66ed0.sample.exe

  • Size

    203KB

  • MD5

    3cd4ec69277564714e1821c979939412

  • SHA1

    67872dfa3607aca69aa0307af8c13bc86c2a02c6

  • SHA256

    33223ddfd3805727e70265d1b9ad22207a5667c6e38b802a140d979927e66ed0

  • SHA512

    ab0a9da426e92ff7b43d999ba787c866207b2731853ab7873a3772e0f8e53087ce578de7316589f36009cee757db51eeca1453e4d4f99a4e0813eb33ed0d361b

Malware Config

Extracted

Path

C:\ProgramData\cryptinfo.txt

Ransom Note
Attention! ! ! All of your copies of your system have been permanently deleted and the data on all partitions and workstations have been encrypted! Stay calm. You can recover all your data by making a payment of 4 BTC (1072 GBP) in Bitcoin currency in order to receive a decryption key. In order to purchase Bitcions you can use https://coincafe.com/signup.php After buying BTC send the equivalent of 4 BTC (1072 GBP) to our BTC adress: 1NaRMgB35pGH3hpoYYCUm4cKatA36pxtxs After payment contact us to receive your decryption key. In mail title write your unique ID: DMALOCK 57:29:79:75:80:37:51:32 Our e-mail: [email protected] ATTENTION! To ensure you that you can recover your data we are able to decrypt two files of your choice that are not larger than 1MB! ATTENTION! Even if your antivirus has removed our program, your data may be still recovered!
Wallets

1NaRMgB35pGH3hpoYYCUm4cKatA36pxtxs

Signatures

  • DMA Locker

    Ransomware family with some advanced features, like encryption of unmapped network shares.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33223ddfd3805727e70265d1b9ad22207a5667c6e38b802a140d979927e66ed0.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\33223ddfd3805727e70265d1b9ad22207a5667c6e38b802a140d979927e66ed0.sample.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\ProgramData\svchosd.exe
      "C:\ProgramData\svchosd.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      PID:1252

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\cryptinfo.txt
    MD5

    1a51a2f92280c58c4d41db19dec9f85f

    SHA1

    7d442bfa88552c9b92ec26dc143ab15860b34b38

    SHA256

    6754b0d6894e5790312a580fa11180dbb291b09814ed31fc68725d019ed06490

    SHA512

    da8b7d192359ea5ff787e961c55565ffb4532380e67024820d4100745a073b93e053ce9b70474764195193a35d32d8045f3a65af2af0fd9d32214ebfdcd94c59

  • memory/1252-61-0x0000000000000000-mapping.dmp
  • memory/1924-60-0x00000000760B1000-0x00000000760B3000-memory.dmp
    Filesize

    8KB