Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-07-2021 12:42

General

  • Target

    8184432307b0f546d168e3e386a20999f5b0de0bd4085753bb2b09cfc7fec071.sample.exe

  • Size

    276KB

  • MD5

    6bfa1c01c3af6206a189b975178965fe

  • SHA1

    260dd322089862a5400a00dbcb35774b66ce2d47

  • SHA256

    8184432307b0f546d168e3e386a20999f5b0de0bd4085753bb2b09cfc7fec071

  • SHA512

    f518f82554b7a4d6c14655cd980ab710e08c20b3efb2979e39429c44cdf85f66f6db2021bd4758ec6cdcfa4c89fe3224628198094888adc4af243d17c730ddf8

Malware Config

Extracted

Path

C:\Boot\bg-BG\-!RecOveR!-ftunh++.Txt

Ransom Note
(:6*5724(.53/5&>?0%2&2#0*=1+1<0 ------- (:6*5724(.53/5&>?0%2&2#0*=1+1<0 NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA-4096. Use the link down below to find additional information on the encryption keys using RSA-4096 https://en.wikipedia.org/wiki/RSA_(cryptosystem) (:6*5724(.53/5&>?0%2&2#0*=1+1<0 ------- (:6*5724(.53/5&>?0%2&2#0*=1+1<0 What exactly that means? It means that on a structural level your files have been transformed . You won't be able to use , read , see or work with them anymore . In other words they are useless , however , there is a possibility to restore them with our help . What exactly happened to your files ??? !!! Two personal RSA-4096 keys were generated for your PC/Laptop; one key is public, another key is private. !!! All your data and files were encrypted by the means of the public key , which you received over the web . !!! In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. (:6*5724(.53/5&>?0%2&2#0*=1+1<0 ----- (:6*5724(.53/5&>?0%2&2#0*=1+1<0 !!! What should you do next ??? In case you have valuable files , we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions , please access your personal homepage by choosing one of the few addresses down below : http://74bfc.flubspiel.com/D87F7A5EA1CD454A http://ibf4d.ukegaub.at/D87F7A5EA1CD454A http://k3cxd.pileanoted.com/D87F7A5EA1CD454A If you can't access your personal homepage or the addresses are not working, complete the following steps: *** Download and Install TOR Browser - http://www.torproject.org/projects/torbrowser.html.en *** Run TOR Browser Insert link in the address bar: xzjvzkgjxebzreap.onion/D87F7A5EA1CD454A (:6*5724(.53/5&>?0%2&2#0*=1+1<0----IMPORTANT*****************INFORMATION---------(:6*5724(.53/5&>?0%2&2#0*=1+1<0 Your personal homepages http://74bfc.flubspiel.com/D87F7A5EA1CD454A http://ibf4d.ukegaub.at/D87F7A5EA1CD454A http://k3cxd.pileanoted.com/D87F7A5EA1CD454A Your personal homepage Tor-Browser xzjvzkgjxebzreap.onion/D87F7A5EA1CD454A Your personal ID D87F7A5EA1CD454A (:6*5724(.53/5&>?0%2&2#0*=1+1<0 (:6*5724(.53/5&>?0%2&2#0*=1+1<0 (:6*5724(.53/5&>?0%2&2#0*=1+1<0
URLs

http://74bfc.flubspiel.com/D87F7A5EA1CD454A

http://ibf4d.ukegaub.at/D87F7A5EA1CD454A

http://k3cxd.pileanoted.com/D87F7A5EA1CD454A

http://xzjvzkgjxebzreap.onion/D87F7A5EA1CD454A

Signatures

  • suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8184432307b0f546d168e3e386a20999f5b0de0bd4085753bb2b09cfc7fec071.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\8184432307b0f546d168e3e386a20999f5b0de0bd4085753bb2b09cfc7fec071.sample.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\Documents\avjgkyofcvia.exe
      C:\Users\Admin\Documents\avjgkyofcvia.exe
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2056
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" Delete Shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:3804
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 1248
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\818443~1.EXE >> NUL
      2⤵
        PID:3676
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1312

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2056-121-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/3128-114-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/3128-115-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/3128-116-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB