Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    31-08-2021 12:42

General

  • Target

    718a32e1233d20058b882251b0265872880e64e5be9ba5c3ff42dfc430f12c91.exe

  • Size

    299KB

  • MD5

    532314c89cc0f6b55b6ee775ae894fc5

  • SHA1

    bcb196361a23efca52af139ca0a579ca4be13478

  • SHA256

    718a32e1233d20058b882251b0265872880e64e5be9ba5c3ff42dfc430f12c91

  • SHA512

    031d48471268163391520a8304ba26ba98a2494305a3cc828fb0f57f22fea432b2747d34cda907a52695f20e963038fdb74406342911e124c9423dfb0a053b63

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. PAY FAST 500$=0.013 btc or the price will increase tomorrow bitcoin address bc1qqxnp9z0ff8x852dyflp5r9r6rzse8jl5hzmqz8 To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? [email protected] TELEGRAM @ payfast290 Your personal ID: 101-1DC-526 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\718a32e1233d20058b882251b0265872880e64e5be9ba5c3ff42dfc430f12c91.exe
    "C:\Users\Admin\AppData\Local\Temp\718a32e1233d20058b882251b0265872880e64e5be9ba5c3ff42dfc430f12c91.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\718a32e1233d20058b882251b0265872880e64e5be9ba5c3ff42dfc430f12c91.exe
      "C:\Users\Admin\AppData\Local\Temp\718a32e1233d20058b882251b0265872880e64e5be9ba5c3ff42dfc430f12c91.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2344
  • C:\Users\Admin\AppData\Local\Temp\C2F8.exe
    C:\Users\Admin\AppData\Local\Temp\C2F8.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
          PID:3756
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic shadowcopy delete
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3024
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
          3⤵
            PID:2260
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
            3⤵
              PID:2224
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
              3⤵
                PID:2852
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
                3⤵
                  PID:2192
                  • C:\Windows\SysWOW64\vssadmin.exe
                    vssadmin delete shadows /all /quiet
                    4⤵
                    • Interacts with shadow copies
                    PID:1052
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 0
                  3⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  PID:1308
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                  3⤵
                    PID:3816
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic shadowcopy delete
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1104
                    • C:\Windows\SysWOW64\vssadmin.exe
                      vssadmin delete shadows /all /quiet
                      4⤵
                      • Interacts with shadow copies
                      PID:2068
                • C:\Windows\SysWOW64\notepad.exe
                  notepad.exe
                  2⤵
                    PID:1424
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3772
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:3636
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3880
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:3640
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:2516
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe
                            1⤵
                              PID:2432
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              1⤵
                                PID:3660
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe
                                1⤵
                                  PID:3184
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  1⤵
                                    PID:208
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3336

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                    MD5

                                    bc382383b6c90d20dba3f58aa0f40ade

                                    SHA1

                                    b626e4d049d88702236910b302c955eecc8c7d5f

                                    SHA256

                                    bf25937b534e738f02e5ec01592dd9a72d79e67bc32f3a5e157a0608f5bbd117

                                    SHA512

                                    651e85acf56ec7bffdc10941ba3bcebea5aede44d479e4db5d61160de2b975c484499a95564adaf90f350d6a1bf3aa97774019f1464045114cbb97806fc76c2f

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                    MD5

                                    a2981517afbb3ebe48d2168b07274f47

                                    SHA1

                                    78e0fa382ca97436ec5c43209a2e391b41d356ab

                                    SHA256

                                    f5ef795d1577213ce930034afc93387232cc95dfe53db40db0ed65fbb44bcfae

                                    SHA512

                                    4e939a2270036ebf0eaec96ba231eb38cb4e2389064a30e5f3b9e5e5581d363ab934431e69978e015f25f3352d17e3b3242d02357aa034838a94912fa8d6ba15

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                    MD5

                                    0465994d32988b4ff5811340c4905188

                                    SHA1

                                    7b4043cbd9509bc78b08863ad22b720632686785

                                    SHA256

                                    b33b95c79ca7fc2da4e43282f29ec14db42bdafd53c8888de793cea52caa20bb

                                    SHA512

                                    04654263a6391c84e0fd230a992dbd107f905599a066d124055591ce19a9d74b61627bb9d4dc9df89f396b12f795b649f0331e4aad39304a5ad0e0bccc36ad43

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                    MD5

                                    c1befcf455f369cabc3702ba9b56c572

                                    SHA1

                                    4d92ed6e682804187243e2612c43b4a2de173a12

                                    SHA256

                                    aa1cc8531593b3f6321ff65d8700558075a28b450ee624e516ede23f520f5e1b

                                    SHA512

                                    8e26594fd8e46bdf0390ebad5a5c60ec0dbc54148d6bd05e5b0cfae63b95ab4882f3b48965b7770bf21e08d37f82089ec2211fb058780fd0676ddd942505752c

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                    MD5

                                    1029e987da4603a8591a08ed00adbd02

                                    SHA1

                                    87c60bf7e87f37cff18d8a2406265c64d6738202

                                    SHA256

                                    dab91dfe569211c4fb512cfc940984d3c127a1999e3831a2290f0eebd9c8751c

                                    SHA512

                                    0110d165ad2a2179a96756478a35cc49b486afc5edf4ac2f6b7138b49ead7e446de0852188fbc49055f0d05e535c20a2c67b20e8a809679866ed1f9b38d97aad

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                    MD5

                                    a75a8ccffe67a6e3996fd22092b88d65

                                    SHA1

                                    0268299fba45bc9c30b9e363b7a25f51ae47ba4b

                                    SHA256

                                    c5458d63d951c4b73c8c3bdee76f3be3f4eda52af683be5c42e3b674666829de

                                    SHA512

                                    5ed231dfbd8dd0b6d5d12d2c07e88d4548ca52ace3fb2f041baa4d6e73e2a776e2f0ea3d9cff87ca00016994765ad3ebbe6e611f75b061c8d6e681d994fef538

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\C5RK5M0Y.htm

                                    MD5

                                    b1cd7c031debba3a5c77b39b6791c1a7

                                    SHA1

                                    e5d91e14e9c685b06f00e550d9e189deb2075f76

                                    SHA256

                                    57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                                    SHA512

                                    d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZIIA2USJ\76GLINP8.htm

                                    MD5

                                    8615e70875c2cc0b9db16027b9adf11d

                                    SHA1

                                    4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

                                    SHA256

                                    da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

                                    SHA512

                                    cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

                                  • C:\Users\Admin\AppData\Local\Temp\C2F8.exe

                                    MD5

                                    bdfde890a781bf135e6eb4339ff9424f

                                    SHA1

                                    a5bfca4601242d3ff52962432efb15ab9202217f

                                    SHA256

                                    b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                    SHA512

                                    7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                  • C:\Users\Admin\AppData\Local\Temp\C2F8.exe

                                    MD5

                                    bdfde890a781bf135e6eb4339ff9424f

                                    SHA1

                                    a5bfca4601242d3ff52962432efb15ab9202217f

                                    SHA256

                                    b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                    SHA512

                                    7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                  • C:\Users\Admin\AppData\Local\Temp\~temp001.bat

                                    MD5

                                    ef572e2c7b1bbd57654b36e8dcfdc37a

                                    SHA1

                                    b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

                                    SHA256

                                    e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

                                    SHA512

                                    b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe

                                    MD5

                                    bdfde890a781bf135e6eb4339ff9424f

                                    SHA1

                                    a5bfca4601242d3ff52962432efb15ab9202217f

                                    SHA256

                                    b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                    SHA512

                                    7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe

                                    MD5

                                    bdfde890a781bf135e6eb4339ff9424f

                                    SHA1

                                    a5bfca4601242d3ff52962432efb15ab9202217f

                                    SHA256

                                    b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                    SHA512

                                    7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe

                                    MD5

                                    bdfde890a781bf135e6eb4339ff9424f

                                    SHA1

                                    a5bfca4601242d3ff52962432efb15ab9202217f

                                    SHA256

                                    b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                    SHA512

                                    7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                  • memory/208-159-0x0000000000370000-0x0000000000375000-memory.dmp

                                    Filesize

                                    20KB

                                  • memory/208-158-0x0000000000000000-mapping.dmp

                                  • memory/208-160-0x0000000000360000-0x0000000000369000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/580-131-0x0000000000000000-mapping.dmp

                                  • memory/1052-170-0x0000000000000000-mapping.dmp

                                  • memory/1104-172-0x0000000000000000-mapping.dmp

                                  • memory/1308-167-0x0000000000000000-mapping.dmp

                                  • memory/1376-118-0x0000000000000000-mapping.dmp

                                  • memory/1424-138-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1424-134-0x0000000000000000-mapping.dmp

                                  • memory/2068-173-0x0000000000000000-mapping.dmp

                                  • memory/2192-165-0x0000000000000000-mapping.dmp

                                  • memory/2224-163-0x0000000000000000-mapping.dmp

                                  • memory/2260-162-0x0000000000000000-mapping.dmp

                                  • memory/2344-115-0x0000000000402FAB-mapping.dmp

                                  • memory/2344-114-0x0000000000400000-0x0000000000409000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/2432-151-0x00000000005C0000-0x00000000005CC000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/2432-149-0x0000000000000000-mapping.dmp

                                  • memory/2432-150-0x00000000005D0000-0x00000000005D6000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/2516-140-0x0000000000000000-mapping.dmp

                                  • memory/2516-148-0x00000000005F0000-0x00000000005F9000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/2516-147-0x0000000000800000-0x0000000000805000-memory.dmp

                                    Filesize

                                    20KB

                                  • memory/2852-164-0x0000000000000000-mapping.dmp

                                  • memory/3016-117-0x00000000012E0000-0x00000000012F6000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3024-171-0x0000000000000000-mapping.dmp

                                  • memory/3184-157-0x0000000000CB0000-0x0000000000CB9000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/3184-155-0x0000000000000000-mapping.dmp

                                  • memory/3184-156-0x0000000000CC0000-0x0000000000CC5000-memory.dmp

                                    Filesize

                                    20KB

                                  • memory/3636-126-0x0000000000F30000-0x0000000000F3C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/3636-123-0x0000000000000000-mapping.dmp

                                  • memory/3636-125-0x0000000000F40000-0x0000000000F47000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/3640-136-0x0000000000B60000-0x0000000000B69000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/3640-137-0x0000000000B50000-0x0000000000B5F000-memory.dmp

                                    Filesize

                                    60KB

                                  • memory/3640-130-0x0000000000000000-mapping.dmp

                                  • memory/3660-152-0x0000000000000000-mapping.dmp

                                  • memory/3660-154-0x00000000005D0000-0x00000000005D9000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/3660-153-0x00000000005E0000-0x00000000005E4000-memory.dmp

                                    Filesize

                                    16KB

                                  • memory/3756-161-0x0000000000000000-mapping.dmp

                                  • memory/3772-124-0x0000000002F70000-0x0000000002FDB000-memory.dmp

                                    Filesize

                                    428KB

                                  • memory/3772-122-0x0000000003200000-0x0000000003274000-memory.dmp

                                    Filesize

                                    464KB

                                  • memory/3772-121-0x0000000000000000-mapping.dmp

                                  • memory/3816-166-0x0000000000000000-mapping.dmp

                                  • memory/3880-127-0x0000000000000000-mapping.dmp

                                  • memory/3880-129-0x0000000003060000-0x000000000306B000-memory.dmp

                                    Filesize

                                    44KB

                                  • memory/3880-128-0x0000000003070000-0x0000000003077000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/4060-116-0x0000000000030000-0x000000000003A000-memory.dmp

                                    Filesize

                                    40KB