Analysis
-
max time kernel
86s -
max time network
121s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
03/08/2021, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
Document.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Document.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
Document.exe
-
Size
14.1MB
-
MD5
5210735409235c1aaf674fefddd33e35
-
SHA1
7c75657618cdeb21eedd587d960a608c4ead60f1
-
SHA256
053e7603d2776f39c17d74cd5a095d2fa4727ce019cb91274c135be4b9732358
-
SHA512
e382f86366f1a5dc7f665dd19e48410e69614cced4b5cb2deabec58e4b948906d34df42195010ea3a58e5c63579f042b0b6eb8e2f70c99d9b013d776f098985d
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\AppData\Local\Temp\RANSOM_NOTE.txt
Ransom Note
The harddisks of your computer have been encrypted with an Military grade encryption algorithm.
There is no way to restore your data without a special key.
Only we can decrypt your files!
To purchase your key and restore your data, please follow these three easy steps:
1. Email the file called EMAIL_ME.txt at C:\Users\Admin/Desktop/EMAIL_ME.txt to [email protected]
2. You will recieve your personal BTC address for payment.
Once payment has been completed, send another email to [email protected] stating "PAID".
We will check to see if payment has been paid.
3. You will receive a text file with your KEY that will unlock all your files.
IMPORTANT: To decrypt your files, place text file on desktop and wait. Shortly after it will begin to decrypt all files.
WARNING:
Do NOT attempt to decrypt your files with any software as it is obselete and will not work, and may cost you more to unlcok your files.
Do NOT change file names, mess with the files, or run deccryption software as it will cost you more to unlock your files-
-and there is a high chance you will lose your files forever.
Do NOT send "PAID" button without paying, price WILL go up for disobedience.
Do NOT think that we wont delete your files altogether and throw away the key if you refuse to pay. WE WILL.
Emails
Signatures
-
Loads dropped DLL 43 IoCs
pid Process 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe 4068 Document.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\Documents\desktop.ini Document.exe File created C:\Users\Admin\Documents\Desktop.ini Document.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 api.ipify.org 8 api.ipify.org -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 636 wrote to memory of 4068 636 Document.exe 75 PID 636 wrote to memory of 4068 636 Document.exe 75 PID 4068 wrote to memory of 1868 4068 Document.exe 81 PID 4068 wrote to memory of 1868 4068 Document.exe 81 PID 4068 wrote to memory of 416 4068 Document.exe 82 PID 4068 wrote to memory of 416 4068 Document.exe 82 PID 4068 wrote to memory of 4036 4068 Document.exe 83 PID 4068 wrote to memory of 4036 4068 Document.exe 83 PID 4068 wrote to memory of 204 4068 Document.exe 84 PID 4068 wrote to memory of 204 4068 Document.exe 84 PID 4068 wrote to memory of 212 4068 Document.exe 85 PID 4068 wrote to memory of 212 4068 Document.exe 85 PID 4068 wrote to memory of 3992 4068 Document.exe 86 PID 4068 wrote to memory of 3992 4068 Document.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Document.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:1868
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:416
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:4036
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:204
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:212
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe RANSOM_NOTE.txt3⤵PID:3992
-
-