Analysis
-
max time kernel
154s -
max time network
96s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26/08/2021, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
winnt32.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
winnt32.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
winnt32.exe
-
Size
441KB
-
MD5
bc0b5052b957c3bedff6bb3cb6e0d646
-
SHA1
593a2d83afdf8377207af4b1b20573a2aa83b7bf
-
SHA256
4e33391000cf4732b82569f2ff0196e3cfee10a67b7dcaf52070ac7e2f79826e
-
SHA512
fc7ea750aa4b886b01aaa41dfacc69ea6082913965af0dff68cdbf4430b79aa584d057369680d3e7ee5f0cb41cd16d50ef6418bcf5ec5adf4c7fb2d7acb6ac20
Malware Config
Extracted
Path
C:\LCRY_README.txt
Ransom Note
YOU ARE NOW VICTIM OF LCRY RANSOMWARE!
YOUR FILES ARE ENCRYPTED USING A STRONG ALGORITHM!
YOU HAVE NO WAY TO DECRYPT YOUR FILES UNLESS YOU PURCHASE A KEY!
DON'T WORRY!THE KEY IS EASY TO PURCHASE IF YOU FOLLOW THE INSTRUCTIONS!
1.REGISTER AN EMAIL ACCOUNT.
2.CONTACT [email protected]!
3.GIVE OUT YOUR MACHINE ID IN [SYSTEMDRIVE]\LCRY_MACHINEID.ID.
4.PURCHASE THE KEY AND REMEMBER IT.
5.OPEN [SYSTEMDRIVE]\LCRY_DECRYPTOR.EXE OR THE EXE OF LCRY RANSOMWARE YOU JUST OPENED.
6.ENTER THE KEY.
7.WAIT FOR YOUR FILES TO BE DECRYPTED.
PLEASE FOLLOW THE INSTRUCTIONS OR YOU MUST SAY GOODBYE TO YOUR FILES!
Emails
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\LCRY_DECRYPTOR.exe" winnt32.exe -
Executes dropped EXE 4 IoCs
pid Process 1764 winnt32.exe 1484 winnt32.exe 428 LCRY_DECRYPTOR.exe 1316 winnt32.exe -
resource yara_rule behavioral1/files/0x00040000000130be-61.dat upx behavioral1/files/0x00040000000130be-63.dat upx behavioral1/files/0x00040000000130be-65.dat upx behavioral1/files/0x00040000000130be-67.dat upx behavioral1/files/0x00040000000130be-70.dat upx behavioral1/files/0x00030000000130c7-73.dat upx behavioral1/files/0x00030000000130c7-72.dat upx behavioral1/files/0x00040000000130be-77.dat upx -
Loads dropped DLL 2 IoCs
pid Process 540 winnt32.exe 868 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsCheck = "C:\\LCRY_DECRYPTOR.exe" winnt32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winnt32.exe -
Drops desktop.ini file(s) 35 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\H18KNA1T\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Music\desktop.ini winnt32.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini winnt32.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2455352368-1077083310-2879168483-1000\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Documents\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Searches\desktop.ini winnt32.exe File opened for modification C:\Users\Public\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Pictures\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Videos\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NU1L7O13\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Libraries\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\E9RC2MV6\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Videos\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VNYR844D\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Desktop\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Links\desktop.ini winnt32.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Documents\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Downloads\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Music\desktop.ini winnt32.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini winnt32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\winnt32.exe winnt32.exe File opened for modification C:\Windows\system32\winnt32.exe winnt32.exe File created C:\Windows\system32\winnt32.exe LCRY_DECRYPTOR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1584 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1484 winnt32.exe 1484 winnt32.exe 1316 winnt32.exe 1316 winnt32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1764 winnt32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 380 AUDIODG.EXE Token: 33 380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 380 AUDIODG.EXE Token: SeShutdownPrivilege 1316 winnt32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 540 wrote to memory of 1764 540 winnt32.exe 26 PID 540 wrote to memory of 1764 540 winnt32.exe 26 PID 540 wrote to memory of 1764 540 winnt32.exe 26 PID 1764 wrote to memory of 1584 1764 winnt32.exe 35 PID 1764 wrote to memory of 1584 1764 winnt32.exe 35 PID 1764 wrote to memory of 1584 1764 winnt32.exe 35 PID 1764 wrote to memory of 1484 1764 winnt32.exe 36 PID 1764 wrote to memory of 1484 1764 winnt32.exe 36 PID 1764 wrote to memory of 1484 1764 winnt32.exe 36 PID 428 wrote to memory of 1316 428 LCRY_DECRYPTOR.exe 38 PID 428 wrote to memory of 1316 428 LCRY_DECRYPTOR.exe 38 PID 428 wrote to memory of 1316 428 LCRY_DECRYPTOR.exe 38 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winnt32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winnt32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\winnt32.exe"C:\Users\Admin\AppData\Local\Temp\winnt32.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\system32\winnt32.exe"C:\Windows\system32\winnt32.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1764 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\LCRY_README.txt3⤵
- Opens file in notepad (likely ransom note)
PID:1584
-
-
C:\Windows\system32\winnt32.exe"C:\Windows\system32\winnt32.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1481⤵
- Suspicious use of AdjustPrivilegeToken
PID:380
-
C:\LCRY_DECRYPTOR.exeC:\LCRY_DECRYPTOR.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\system32\winnt32.exe"C:\Windows\system32\winnt32.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-