Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    16/11/2021, 16:46

General

  • Target

    e_win.exe

  • Size

    664KB

  • MD5

    2c1bacb056654515171bedadaecfe67e

  • SHA1

    d45f9fccbb7c4c1221e3eb4d7801fa0a5910012e

  • SHA256

    d81f751a2b47e3195fb035c804fc7a54d1c51426f759c53048bd9837663a101a

  • SHA512

    79977a9fd287bc32072e74a45cc81e96351b6805e65c700df1be5e1e64a3c3f1db36830544418490896f88e630748d14c88bf86321a0f88ca50b3dffab57830a

Score
10/10

Malware Config

Extracted

Path

C:\Guide To Recover Your Files.txt

Ransom Note
!!! YOUR NETWORK ENCRYPTED !!! What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data. What guarantees? ---------------------------------------------- We guarantee that you can recover all your files safely and easily. You can decrypt a single file for warranty - we can do it. Find a *.chichi file on your computer and upload and get the original. (maximum file size - 512Kb) Chat with support But if you want to decrypt all your files, you need to pay. Write to support if you want to buy decryptor. How to contact us? ---------------------------------------------- Write to email : [email protected], [email protected], [email protected], [email protected], [email protected] How to Pay? ---------------------------------------------- You need pay $300,000 Payment has to be deposited in Bitcoin based on the Bitcoin/USD exchange rate at the moment of payment. The address you have to make payment is: bc1q0lasrt2qjgantwy0ylzrdttlmmz6ap09l8964g Attention! ---------------------------------------------- Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. You have to deposit payment within 72 hours (3 days) after receiving this message, otherwise, you will lose your files forever and we will start posting your data to the dark web.

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 22 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e_win.exe
    "C:\Users\Admin\AppData\Local\Temp\e_win.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1876
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping localhost -n 3 > nul & del /q "C:\Users\Admin\AppData\Local\Temp\e_win.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\SysWOW64\PING.EXE
        ping localhost -n 3
        3⤵
        • Runs ping.exe
        PID:1968
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1052-55-0x0000000074E51000-0x0000000074E53000-memory.dmp

    Filesize

    8KB