Analysis

  • max time kernel
    233s
  • max time network
    212s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    30/10/2021, 03:59

General

  • Target

    SS.exe

  • Size

    30.3MB

  • MD5

    d6d78e94de610fad6749338f855edbcc

  • SHA1

    0fb9d7b713ae158bf35f480f62d20255b6d14a97

  • SHA256

    f0f90338553ab244d779b2f172c2e6c82f7fc5725cba6ddb8d09c48d5f481e07

  • SHA512

    33f36597a642af214f2e349015f5a0a625014536ae00016e9fdc110f2a37ea84cdfb7c6e9039a02830730314fc8358bc7076c7fdfec12c140f4394cfb0e4079f

Malware Config

Extracted

Path

C:\Windows\Vss\ReadIt.txt

Ransom Note
Hello my friend Your system was vulnerable I'm here to teach you a lesson,The Security Lesson!!!! All your files are encrypted and the important one stolen You must pay an anount of Bitcoin in exchange for decrypting files and understanding the flaws in your system And prevent your files from becoming public Don't worry about the amount, it's spent on the security of your system and it's fair. To show our good intentions and trust, you can send us a small, worthless file to test the decryption. This is your ID : 1BC1EC48 And this is my email :[email protected] Send your ID to my email to speack about it If I don't respond for 8 hours, send messages to these emails : - [email protected] - [email protected] Don't forget if you try to decypt them yourself, never come back to us. So the first thing you have to do is email us because no one can decrypt them.

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Loads dropped DLL 59 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SS.exe
    "C:\Users\Admin\AppData\Local\Temp\SS.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\SS.exe
      "C:\Users\Admin\AppData\Local\Temp\SS.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell.exe -C Set-MpPreference -DisableRealtimeMonitoring $true ;
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3412
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -C Set-MpPreference -DisableRealtimeMonitoring $true ;
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1100
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell.exe -C vssadmin Delete Shadows /all /quiet ;
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -C vssadmin Delete Shadows /all /quiet ;
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Windows\system32\vssadmin.exe
            "C:\Windows\system32\vssadmin.exe" Delete Shadows /all /quiet
            5⤵
            • Interacts with shadow copies
            PID:3208
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Windows\system32\reg.exe
          REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
          4⤵
          • Modifies registry key
          PID:2200
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2252
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3720

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1100-196-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-220-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-182-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-183-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-184-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-185-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-186-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-187-0x0000012C71190000-0x0000012C71191000-memory.dmp

      Filesize

      4KB

    • memory/1100-188-0x0000012C71430000-0x0000012C71432000-memory.dmp

      Filesize

      8KB

    • memory/1100-189-0x0000012C71433000-0x0000012C71435000-memory.dmp

      Filesize

      8KB

    • memory/1100-190-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-191-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-192-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-193-0x0000012C73F30000-0x0000012C73F31000-memory.dmp

      Filesize

      4KB

    • memory/1100-194-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-231-0x0000012C71438000-0x0000012C71439000-memory.dmp

      Filesize

      4KB

    • memory/1100-197-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-201-0x0000012C71436000-0x0000012C71438000-memory.dmp

      Filesize

      8KB

    • memory/1100-218-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1100-219-0x0000012C6F490000-0x0000012C6F492000-memory.dmp

      Filesize

      8KB

    • memory/1532-237-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-232-0x00000175426C0000-0x00000175426C2000-memory.dmp

      Filesize

      8KB

    • memory/1532-223-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-240-0x00000175426C6000-0x00000175426C8000-memory.dmp

      Filesize

      8KB

    • memory/1532-225-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-226-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-227-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-230-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-229-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-224-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/1532-234-0x00000175426C3000-0x00000175426C5000-memory.dmp

      Filesize

      8KB

    • memory/1532-233-0x0000017528710000-0x0000017528712000-memory.dmp

      Filesize

      8KB

    • memory/3104-241-0x000001E368430000-0x000001E368431000-memory.dmp

      Filesize

      4KB