Resubmissions

07/09/2022, 19:58

220907-ypwc3achd3 7

03/08/2021, 09:41

210803-sp73xlckl2 10

Analysis

  • max time kernel
    86s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    03/08/2021, 09:41

General

  • Target

    Document.exe

  • Size

    14.1MB

  • MD5

    5210735409235c1aaf674fefddd33e35

  • SHA1

    7c75657618cdeb21eedd587d960a608c4ead60f1

  • SHA256

    053e7603d2776f39c17d74cd5a095d2fa4727ce019cb91274c135be4b9732358

  • SHA512

    e382f86366f1a5dc7f665dd19e48410e69614cced4b5cb2deabec58e4b948906d34df42195010ea3a58e5c63579f042b0b6eb8e2f70c99d9b013d776f098985d

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RANSOM_NOTE.txt

Ransom Note
The harddisks of your computer have been encrypted with an Military grade encryption algorithm. There is no way to restore your data without a special key. Only we can decrypt your files! To purchase your key and restore your data, please follow these three easy steps: 1. Email the file called EMAIL_ME.txt at C:\Users\Admin/Desktop/EMAIL_ME.txt to [email protected] 2. You will recieve your personal BTC address for payment. Once payment has been completed, send another email to [email protected] stating "PAID". We will check to see if payment has been paid. 3. You will receive a text file with your KEY that will unlock all your files. IMPORTANT: To decrypt your files, place text file on desktop and wait. Shortly after it will begin to decrypt all files. WARNING: Do NOT attempt to decrypt your files with any software as it is obselete and will not work, and may cost you more to unlcok your files. Do NOT change file names, mess with the files, or run deccryption software as it will cost you more to unlock your files- -and there is a high chance you will lose your files forever. Do NOT send "PAID" button without paying, price WILL go up for disobedience. Do NOT think that we wont delete your files altogether and throw away the key if you refuse to pay. WE WILL.

Signatures

  • Loads dropped DLL 43 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Document.exe
    "C:\Users\Admin\AppData\Local\Temp\Document.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\Document.exe
      "C:\Users\Admin\AppData\Local\Temp\Document.exe"
      2⤵
      • Loads dropped DLL
      • Drops desktop.ini file(s)
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\SYSTEM32\notepad.exe
        notepad.exe RANSOM_NOTE.txt
        3⤵
          PID:1868
        • C:\Windows\SYSTEM32\notepad.exe
          notepad.exe RANSOM_NOTE.txt
          3⤵
            PID:416
          • C:\Windows\SYSTEM32\notepad.exe
            notepad.exe RANSOM_NOTE.txt
            3⤵
              PID:4036
            • C:\Windows\SYSTEM32\notepad.exe
              notepad.exe RANSOM_NOTE.txt
              3⤵
                PID:204
              • C:\Windows\SYSTEM32\notepad.exe
                notepad.exe RANSOM_NOTE.txt
                3⤵
                  PID:212
                • C:\Windows\SYSTEM32\notepad.exe
                  notepad.exe RANSOM_NOTE.txt
                  3⤵
                    PID:3992

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads