Overview
overview
10Static
static
BS.exe
windows7_x64
10BS.exe
windows10_x64
10BuildS.exe
windows7_x64
10BuildS.exe
windows10_x64
10READS.exe
windows7_x64
10READS.exe
windows10_x64
10baseus_nowin.exe
windows7_x64
10baseus_nowin.exe
windows10_x64
10rbs.exe
windows7_x64
10rbs.exe
windows10_x64
10scan.exe
windows7_x64
1scan.exe
windows10_x64
1Analysis
-
max time kernel
155s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
20-10-2021 09:41
Static task
static1
Behavioral task
behavioral1
Sample
BS.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
BS.exe
Resource
win10-en-20211014
Behavioral task
behavioral3
Sample
BuildS.exe
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
BuildS.exe
Resource
win10-en-20211014
Behavioral task
behavioral5
Sample
READS.exe
Resource
win7-en-20210920
Behavioral task
behavioral6
Sample
READS.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
baseus_nowin.exe
Resource
win7-en-20210920
Behavioral task
behavioral8
Sample
baseus_nowin.exe
Resource
win10-en-20210920
Behavioral task
behavioral9
Sample
rbs.exe
Resource
win7-en-20211014
Behavioral task
behavioral10
Sample
rbs.exe
Resource
win10-en-20210920
Behavioral task
behavioral11
Sample
scan.exe
Resource
win7-en-20211014
Behavioral task
behavioral12
Sample
scan.exe
Resource
win10-en-20210920
General
-
Target
READS.exe
-
Size
53KB
-
MD5
9bd839a710177cf31625c09e321418ba
-
SHA1
82ebafbffb2ff94b91c037d5b51561d726ec32c5
-
SHA256
3e526ba55e9dc43928b592e879aa2ea896681e709a22c6b0b8911d6f264ed63c
-
SHA512
d3974db692f256f7733ccbf5d130bdcdcc18d18147b0522e8b0a3c10161604c1ee23e651cd132e3e61d81ff99c8af5a24abf465426aedc6dca1baa7adb53fc34
Malware Config
Extracted
C:\how_to_back_files.html
href="coleman.dec@tutanota.com
">coleman.dec@tutanota.com
href="lauracc@msgsafe.io">lauracc@msgsafe.io</a>
Signatures
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
READS.exedescription ioc process File renamed C:\Users\Admin\Pictures\NewWrite.tiff => C:\Users\Admin\Pictures\NewWrite.tiff.read READS.exe File renamed C:\Users\Admin\Pictures\OpenRead.raw => C:\Users\Admin\Pictures\OpenRead.raw.read READS.exe File renamed C:\Users\Admin\Pictures\ResumeUninstall.png => C:\Users\Admin\Pictures\ResumeUninstall.png.read READS.exe File renamed C:\Users\Admin\Pictures\UndoProtect.raw => C:\Users\Admin\Pictures\UndoProtect.raw.read READS.exe File opened for modification C:\Users\Admin\Pictures\NewWrite.tiff READS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
READS.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce READS.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\READS.exe" READS.exe -
Drops desktop.ini file(s) 27 IoCs
Processes:
READS.exedescription ioc process File opened for modification C:\Users\Public\Desktop\desktop.ini READS.exe File opened for modification C:\Users\Admin\Videos\desktop.ini READS.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini READS.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini READS.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini READS.exe File opened for modification C:\Program Files (x86)\desktop.ini READS.exe File opened for modification C:\Users\Public\Videos\desktop.ini READS.exe File opened for modification C:\Users\Public\Downloads\desktop.ini READS.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini READS.exe File opened for modification C:\Users\Public\desktop.ini READS.exe File opened for modification C:\Users\Public\Music\desktop.ini READS.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini READS.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini READS.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini READS.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini READS.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini READS.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini READS.exe File opened for modification C:\Users\Admin\Documents\desktop.ini READS.exe File opened for modification C:\Users\Public\Documents\desktop.ini READS.exe File opened for modification C:\Users\Admin\Searches\desktop.ini READS.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini READS.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini READS.exe File opened for modification C:\Users\Admin\Music\desktop.ini READS.exe File opened for modification C:\Users\Admin\Links\desktop.ini READS.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini READS.exe File opened for modification C:\Users\Public\Pictures\desktop.ini READS.exe File opened for modification C:\Users\Public\Libraries\desktop.ini READS.exe -
Drops file in Program Files directory 64 IoCs
Processes:
READS.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN026.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\SLINTL.DLL READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD_F_COL.HXK READS.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\CodeFile.zip READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCINFO.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\PROCDB.XLAM READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECURE.CFG READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\SalesReport.xltx READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.xml READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWCUTCHR.DLL READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\QP.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR43F.GIF READS.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\how_to_back_files.html READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSTYLE.DLL READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLCPRTID.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB9.BDR READS.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\Microsoft.VisualStudio.Tools.Applications.Project.dll READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\SignedComponents.cer READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONINTL.REST.IDX_DLL READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\BG_ADOBE.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\NOTE.CFG READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR50F.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AD.DPV READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZFORM.DPV READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEB11.POC READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7ES.LEX READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\utilityfunctions.js READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_right_over.gif READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialReport.dotx READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSLaunch.dll READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGACCBAR.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\SUCTION.WAV READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\GIGGLE.WAV READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Discussion14.gta READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLKFSTUB.DLL READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN022.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN081.XML READS.exe File created C:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\how_to_back_files.html READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR34B.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\Maple.gif READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXSEC32.DLL READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONFILTER.DLL READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WCOMP98.POC READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImageMaskSmall.bmp READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Msgbox.accdt READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENV98SP.POC READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\HEADER.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\TAB_OFF.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen.css READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\MMSL.ICO READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR48B.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSIDEBRV.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGTOC.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK.HOL READS.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\how_to_back_files.html READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGLINACC.DPV READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PICTPH.POC READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_Premium.gif READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLFLTR.DAT READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.JP.XML READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR19F.GIF READS.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XML2WORD.XSL READS.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/948-54-0x0000000076961000-0x0000000076963000-memory.dmpFilesize
8KB