Resubmissions

23-08-2021 11:14

210823-v9jqagsjfs 10

25-06-2021 09:46

210625-zbrs642ns2 10

Analysis

  • max time kernel
    1612s
  • max time network
    1801s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    23-08-2021 11:14

General

  • Target

    53936fcc62ed6e3515b3515531993d92be1d3aca9049f30a2ab2e0805cc45b8d.bin.sample.dll

  • Size

    122KB

  • MD5

    9cfb3b75ab491fa2fb2598914a7558f4

  • SHA1

    6ba4bfef1a07ef5ba8df319e183dbc253ab45ad8

  • SHA256

    53936fcc62ed6e3515b3515531993d92be1d3aca9049f30a2ab2e0805cc45b8d

  • SHA512

    7799e9afdc0be4473e0e2bd9d524e7b6b6de041c5b9b30a5441d50ae0bb700aa516ed891f6151f1c40d1184d7b5e1eb45d05dfc58834732413466425751e1d54

Malware Config

Extracted

Path

C:\vcy2u828-readme.txt

Ransom Note
---=== Welcome. Again. ===--- [-] Whats Happen? [-] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension vcy2u828. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [-] What guarantees? [-] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9EF24CB4BA8A76AC 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/9EF24CB4BA8A76AC Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: vYUEY7bvwN26Xt2UVxi95cMydO0DC9KiDhaZO5o4D970Y3XnyAM/35rLrJEzEV+k /4DRCQF82Xnl9cX2SQ6crbI/xT6HwyvifPdUuVP+pf5LZ4j4h6YbiHjubstWBFzY iq04DwFnbswM2wj4R6jm3/tZsBBG6AfrJIVmiDN3GnY6TxhquNVw7SrhA3CokG2N h0urQ8Bd5YZzLjNH2FMlx1aHihO4NRfFjzAfDN58Rm5BgDrrgAQO8NqFV/LoSfaG dIFAvzdLCF2UYp58o6P2/C+YgYqGMu80jg0SgzzlsBuU2KCLlnNRxGduawCR34cW 02XK8tkaMqaggFcLXzaPrOWiYA63NhzxNEBMrc+2rrCVQbMoC8nt8BtLyi/WYUJ8 mJ/ujkeHANaHjItm16AW33DB4vZlCgsirxlSCCpR+cVAi6b+ylpGL02o/8lvUDz+ t4DDKkF2EssQNgiqRKGirzPTADgLyLv4nRlaRnAPZQ6uTmmVgo54m3rOZwBliPlA 5st0PiKSpw30mVTRgCfIVjXj1Tp6do8NNXG7rkWYV7SIgSM+dF+123LDfV7OFvGC d/mqrJSQgy9KLI1VQcnsWV+aD7Oo5j+DWsZfFVBo57mTsKgxZ07Xn+SsDHKTFUnq Cqo8+RgdsWUYbLpk7dKj/9ouzreL6LXtWSxUl/4wFKS8TSkZa7pevcyBKubtUCul ioW/z/gEQHPjlVNRv0yGXexK8ZVTPlmQsb7iMZbt/dcnk7sJIjqtB8XhJBVQ6vbc PBhkedHxqOExclLK2V0SPwvM7ap6ILH3VWICMMTPbpQkyUV5DnNxgyfezqvSjSFZ EzBAsuvkW86pzrsCLdMmxi3uUxTkmXA35pfSC5Yn6mHQIY56d6kaylOXQmcSuKCr t5zg9kDqReqfqlOE/BZ5WB5HqI3LZ00pSQSAIc8CArFRuktTNwqI/LEuD7qA+OyI aSvspsC/4LoAR9nlEQKoXk4PJThsKxgcuuwgsO9nSeDbHg5PC/dzMWOb2VS7BrM1 eK+SOWvJF/tkNT6vwH8KLRlihHWftxTQlNBT5r9aVR17mVHx8eD/stkdvT1pT7kw AgW9gi0kttRtsCXvhoZPfcoC9A+S8SLI63Zr6gFl1q9mjnu5jXBRe3qqGi5Oq5V4 M0mtEtKP1Jv64eWmnyr0tCzeEUsuiRPu17nwAq8GqfNoqi1mF8sKRWXflIK7u9DH rYqiBj+vuSLhAz9FBj69y4vyflMSfVRA8+Od/tI2bHjsUU5idEDe+gLKuVhsGsDQ DKCxWCd32MdzUMDtSNh5nZu7x7OJeplKgzo= ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/9EF24CB4BA8A76AC

http://decoder.re/9EF24CB4BA8A76AC

Signatures

  • suricata: ET MALWARE Known Sinkhole Response Header

    suricata: ET MALWARE Known Sinkhole Response Header

  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\53936fcc62ed6e3515b3515531993d92be1d3aca9049f30a2ab2e0805cc45b8d.bin.sample.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\53936fcc62ed6e3515b3515531993d92be1d3aca9049f30a2ab2e0805cc45b8d.bin.sample.dll
      2⤵
      • Modifies extensions of user files
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
        3⤵
          PID:1932
    • C:\Windows\system32\wbem\unsecapp.exe
      C:\Windows\system32\wbem\unsecapp.exe -Embedding
      1⤵
        PID:744
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1176

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1172-61-0x0000000000000000-mapping.dmp
      • memory/1172-62-0x00000000765F1000-0x00000000765F3000-memory.dmp
        Filesize

        8KB

      • memory/1932-63-0x0000000000000000-mapping.dmp
      • memory/2004-60-0x000007FEFC411000-0x000007FEFC413000-memory.dmp
        Filesize

        8KB