Analysis

  • max time kernel
    153s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-08-2021 07:15

General

  • Target

    d30f4f3ab220d45783b08baec0e322ee10841beed00dc6ff00569ac5d02709fd.exe

  • Size

    172KB

  • MD5

    a8d41cdb1096e641af72ae7dfa954433

  • SHA1

    492971020433977d73baa18080c5615fc28f6e9a

  • SHA256

    d30f4f3ab220d45783b08baec0e322ee10841beed00dc6ff00569ac5d02709fd

  • SHA512

    875f98193a106c6f241f1eda58e720dd2351a7dae1abe5dd312bb9127866d0e11c4a9130177dfaf197750f4eace1367489eb50515b3bac6c944ae39609b875a8

Malware Config

Extracted

Path

C:\Documents and Settings\How To Restore Your Files.txt

Ransom Note
Hi, friend. Your files are encrypted. And you can't do anything with them. If you want to restore them, contact us via telegram @username312321 Price - 350 $ You can pay with BTC - bc1qd53hpk76zutapw8tsgnnkeuuuhuk4ecr2wrd93
Wallets

bc1qd53hpk76zutapw8tsgnnkeuuuhuk4ecr2wrd93

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Signatures

  • Babuk Locker

    RaaS first seen in 2021 initially called Vasa Locker.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Modifies extensions of user files 27 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d30f4f3ab220d45783b08baec0e322ee10841beed00dc6ff00569ac5d02709fd.exe
    "C:\Users\Admin\AppData\Local\Temp\d30f4f3ab220d45783b08baec0e322ee10841beed00dc6ff00569ac5d02709fd.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:664
  • C:\Users\Admin\AppData\Local\Temp\685F.exe
    C:\Users\Admin\AppData\Local\Temp\685F.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\AudioB.exe
      "C:\Users\Admin\AppData\Local\Temp\AudioB.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\AudioB.exe
        "C:\Users\Admin\AppData\Local\Temp\AudioB.exe"
        3⤵
        • Executes dropped EXE
        • Modifies extensions of user files
        • Enumerates connected drives
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1404
          • C:\Windows\system32\vssadmin.exe
            vssadmin.exe delete shadows /all /quiet
            5⤵
            • Interacts with shadow copies
            PID:2368
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\system32\vssadmin.exe
            vssadmin.exe delete shadows /all /quiet
            5⤵
            • Interacts with shadow copies
            PID:1712
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1884

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

2
T1005

Impact

Inhibit System Recovery

2
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\685F.exe
    MD5

    eeb0f28c077d4b7f9740232aa95d93b4

    SHA1

    61d50d4d4c1eee0c8fe9e17bcf78a4f43e482967

    SHA256

    3662c3ba063379af8bca502364807bf88752a36b5ca83671c02ea48fbb0b06af

    SHA512

    6034043269af32b2633e1c2b46dfb766d342dbd64337e868c703090c9b8aa9f4ab7a692d1e5e6eeecbef31b2a77d28183a8ec24b75caabb870219f27b5eae73c

  • C:\Users\Admin\AppData\Local\Temp\685F.exe
    MD5

    eeb0f28c077d4b7f9740232aa95d93b4

    SHA1

    61d50d4d4c1eee0c8fe9e17bcf78a4f43e482967

    SHA256

    3662c3ba063379af8bca502364807bf88752a36b5ca83671c02ea48fbb0b06af

    SHA512

    6034043269af32b2633e1c2b46dfb766d342dbd64337e868c703090c9b8aa9f4ab7a692d1e5e6eeecbef31b2a77d28183a8ec24b75caabb870219f27b5eae73c

  • C:\Users\Admin\AppData\Local\Temp\AudioB.exe
    MD5

    cf88599048145e4911915215a91527f4

    SHA1

    f4ba5c7117736388c4de3442b1d6e4f84628c15d

    SHA256

    9f7d6949fd359dce79d3233eb80101ff706a35de5308543b0488450c19eba0f0

    SHA512

    254f6e26ed075ff1fe46493e36e6ec7eb70db52d2219070b6a77cbf7202d231fc826bd3fb69bdcaee86e45c9ce4ee8bc7085d37d5627a0bc1d2ec86aa9f2c0f7

  • C:\Users\Admin\AppData\Local\Temp\AudioB.exe
    MD5

    cf88599048145e4911915215a91527f4

    SHA1

    f4ba5c7117736388c4de3442b1d6e4f84628c15d

    SHA256

    9f7d6949fd359dce79d3233eb80101ff706a35de5308543b0488450c19eba0f0

    SHA512

    254f6e26ed075ff1fe46493e36e6ec7eb70db52d2219070b6a77cbf7202d231fc826bd3fb69bdcaee86e45c9ce4ee8bc7085d37d5627a0bc1d2ec86aa9f2c0f7

  • C:\Users\Admin\AppData\Local\Temp\AudioB.exe
    MD5

    cf88599048145e4911915215a91527f4

    SHA1

    f4ba5c7117736388c4de3442b1d6e4f84628c15d

    SHA256

    9f7d6949fd359dce79d3233eb80101ff706a35de5308543b0488450c19eba0f0

    SHA512

    254f6e26ed075ff1fe46493e36e6ec7eb70db52d2219070b6a77cbf7202d231fc826bd3fb69bdcaee86e45c9ce4ee8bc7085d37d5627a0bc1d2ec86aa9f2c0f7

  • memory/664-115-0x0000000000400000-0x0000000002CBB000-memory.dmp
    Filesize

    40.7MB

  • memory/664-114-0x0000000002D10000-0x0000000002DBE000-memory.dmp
    Filesize

    696KB

  • memory/1236-136-0x00000000070F0000-0x00000000070F1000-memory.dmp
    Filesize

    4KB

  • memory/1236-132-0x0000000006D80000-0x0000000006D81000-memory.dmp
    Filesize

    4KB

  • memory/1236-125-0x00000000051E0000-0x00000000051E1000-memory.dmp
    Filesize

    4KB

  • memory/1236-126-0x0000000005340000-0x0000000005341000-memory.dmp
    Filesize

    4KB

  • memory/1236-127-0x0000000005330000-0x0000000005331000-memory.dmp
    Filesize

    4KB

  • memory/1236-128-0x0000000005240000-0x0000000005241000-memory.dmp
    Filesize

    4KB

  • memory/1236-129-0x0000000005280000-0x0000000005281000-memory.dmp
    Filesize

    4KB

  • memory/1236-130-0x0000000006BB0000-0x0000000006BB1000-memory.dmp
    Filesize

    4KB

  • memory/1236-131-0x00000000072B0000-0x00000000072B1000-memory.dmp
    Filesize

    4KB

  • memory/1236-124-0x0000000005950000-0x0000000005951000-memory.dmp
    Filesize

    4KB

  • memory/1236-133-0x0000000007CE0000-0x0000000007CE1000-memory.dmp
    Filesize

    4KB

  • memory/1236-134-0x0000000006FB0000-0x0000000006FB1000-memory.dmp
    Filesize

    4KB

  • memory/1236-135-0x0000000007110000-0x0000000007111000-memory.dmp
    Filesize

    4KB

  • memory/1236-122-0x0000000000970000-0x0000000000971000-memory.dmp
    Filesize

    4KB

  • memory/1236-117-0x0000000000000000-mapping.dmp
  • memory/1236-120-0x0000000077020000-0x00000000771AE000-memory.dmp
    Filesize

    1.6MB

  • memory/1404-155-0x0000000000000000-mapping.dmp
  • memory/1712-158-0x0000000000000000-mapping.dmp
  • memory/1720-157-0x0000000000000000-mapping.dmp
  • memory/2336-140-0x0000000000510000-0x0000000000511000-memory.dmp
    Filesize

    4KB

  • memory/2336-145-0x0000000005010000-0x0000000005011000-memory.dmp
    Filesize

    4KB

  • memory/2336-147-0x0000000004E00000-0x0000000004E92000-memory.dmp
    Filesize

    584KB

  • memory/2336-148-0x0000000009510000-0x0000000009521000-memory.dmp
    Filesize

    68KB

  • memory/2336-149-0x0000000009740000-0x00000000097DC000-memory.dmp
    Filesize

    624KB

  • memory/2336-150-0x000000000C010000-0x000000000C041000-memory.dmp
    Filesize

    196KB

  • memory/2336-137-0x0000000000000000-mapping.dmp
  • memory/2336-144-0x0000000005070000-0x0000000005071000-memory.dmp
    Filesize

    4KB

  • memory/2336-146-0x0000000005060000-0x0000000005061000-memory.dmp
    Filesize

    4KB

  • memory/2368-156-0x0000000000000000-mapping.dmp
  • memory/3024-116-0x0000000000620000-0x0000000000636000-memory.dmp
    Filesize

    88KB

  • memory/3576-154-0x0000000000400000-0x0000000000418000-memory.dmp
    Filesize

    96KB

  • memory/3576-152-0x000000000040ABC0-mapping.dmp
  • memory/3576-151-0x0000000000400000-0x0000000000418000-memory.dmp
    Filesize

    96KB