Resubmissions

14-09-2022 13:40

220914-qyhvbsebfq 8

Analysis

  • max time kernel
    66s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    17-08-2021 12:05

General

  • Target

    9f35d284afd3dafb2ab44e4a09ec7ef7cb62574282edf847d8deb7e450665bd6.exe

  • Size

    4.4MB

  • MD5

    f155ec35d67f746593ce8cc4e64d33e5

  • SHA1

    822e0997e6c6d577a7803018dedba01a5ec70dc3

  • SHA256

    9f35d284afd3dafb2ab44e4a09ec7ef7cb62574282edf847d8deb7e450665bd6

  • SHA512

    ed5d2470defa3ecb8cdcdfb6b315ed921ac0719b1a08099f646208770f365866b13e2687dea21f25598d858885d54dd62b60ccefc5c45080bc4ccd6bbc923021

Malware Config

Signatures

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 40 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f35d284afd3dafb2ab44e4a09ec7ef7cb62574282edf847d8deb7e450665bd6.exe
    "C:\Users\Admin\AppData\Local\Temp\9f35d284afd3dafb2ab44e4a09ec7ef7cb62574282edf847d8deb7e450665bd6.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Modifies system certificate store
    PID:1160
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1196

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\README.txt
    MD5

    eb888ab798979c0e0be4c2151db8d2e0

    SHA1

    0dc9921d3cd70e02940724b8968b749bb97d7cbf

    SHA256

    941060fa9535368d066b98dfccda02e0031ec1344111a6aada88f4e429180b94

    SHA512

    e78e288abdc73e5f6fe49910a47b5929330bbf616f4ffe07be4785dea764d6ac72ff28a6a57f6e61e941c6b5a914218721c9caa9d73bfe0d855eafb94494e2d7

  • memory/1196-60-0x000007FEFBC81000-0x000007FEFBC83000-memory.dmp
    Filesize

    8KB