General
-
Target
VSSVC.exe
-
Size
3.1MB
-
Sample
210904-dddcwsdfe4
-
MD5
e4f24d91d8e7290ffd6afc8aa01c6d63
-
SHA1
b552c6af33cc5a62379028687924406cba8ff74d
-
SHA256
5eb371a9cf91b981502d3ee26880b8c15f62b3eeaaa2484d523a2a03a233bebb
-
SHA512
ae0d0c2494b0a4753039f4fdf6a589848a44a386b759511aab9374e9446f84c39895ec2c9d00ed0ce3df07663a9f14e2f21f42a85966336b0e35204da0d82e00
Static task
static1
Behavioral task
behavioral1
Sample
VSSVC.exe
Resource
win7-en
Malware Config
Extracted
C:\Users\Admin\Desktop\DECRYPT-FILES.TXT
bc1q80xu9j6wpesm2jg2w4pzpyhqjd5wsrg46ap6pe
http://mail2tor2zyjdctd.onion/
Targets
-
-
Target
VSSVC.exe
-
Size
3.1MB
-
MD5
e4f24d91d8e7290ffd6afc8aa01c6d63
-
SHA1
b552c6af33cc5a62379028687924406cba8ff74d
-
SHA256
5eb371a9cf91b981502d3ee26880b8c15f62b3eeaaa2484d523a2a03a233bebb
-
SHA512
ae0d0c2494b0a4753039f4fdf6a589848a44a386b759511aab9374e9446f84c39895ec2c9d00ed0ce3df07663a9f14e2f21f42a85966336b0e35204da0d82e00
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Disables Task Manager via registry modification
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Modifies file permissions
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-