Analysis

  • max time kernel
    41s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    07/09/2021, 13:54

General

  • Target

    85b3feab4909c92206c42bcfda5ccc3fac3e4c083dfedf1ec6fa62f446ab78dd.exe

  • Size

    2.9MB

  • MD5

    2afaaba149d078aee64dfc7f979400f0

  • SHA1

    d771c3660ff7f370d9daea55a397b0d9e3d6ba26

  • SHA256

    85b3feab4909c92206c42bcfda5ccc3fac3e4c083dfedf1ec6fa62f446ab78dd

  • SHA512

    5333e86582435b4341c32f701adb75b7356026118292bd59c84807ac27b1099ddd0fe56b840b8e0a3feca60835b05b1e1af2cebb53d557f11213ecf9d46ff7bf

Malware Config

Extracted

Path

C:\readme_readme_readme.txt

Family

tongda

Ransom Note
send 0.3 bitcoin to 12ZsBrX4UTsdjJbx84GcPFGEQaKMyYU29p screenchot and key send to [email protected] and [email protected] key:BT1082HUpW7vxiresIjSNKnMdfPfwsBYw4O9j85uRe83rtGv8HDVYxCl7LDY9s20q6ggJKcgqnf6i5T4RVpJNNImUkvl0BpplF8XtIKsP1LTYPgs7EEan6kELnxy859bxSWvHCJ2bKXcoHl3Zvy1ZD1ESSW1FjfeqvNadoANWBtVK5Wn4Q02Gpu76z5k3oi8QEIpG5nZjUAlTR3wqSfOHjWx6I6mrVqAxrHUZkjLKeuKzo1Bvitd6YjjcJJHMAM0NvSe2plwLgF8EXderc0Rt4H5K0mdPhVmWk7E0nAAhYGrve/M4pVBQs+VZ4ChSixQryGEn+3cJMdG6+5F7HvarA==
Wallets

12ZsBrX4UTsdjJbx84GcPFGEQaKMyYU29p

Signatures

  • Tongda 2000

    Ransomware targetting the Chinese office management software Tongda OA.

  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85b3feab4909c92206c42bcfda5ccc3fac3e4c083dfedf1ec6fa62f446ab78dd.exe
    "C:\Users\Admin\AppData\Local\Temp\85b3feab4909c92206c42bcfda5ccc3fac3e4c083dfedf1ec6fa62f446ab78dd.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "taskkill /f /im mysqld.exe & cd ../mysql5/bin/ & move /Y mysqld.exe mysqld.exe1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im mysqld.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c "taskkill /f /im mysqld.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im mysqld.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads