Analysis

  • max time kernel
    152s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01/02/2022, 13:43

General

  • Target

    55d28e9c577d54732a546acb9b74a12e20cf25afab9636273abcabbb1a00e83d.exe

  • Size

    1.2MB

  • MD5

    8801eb4b1617295998c6812022792787

  • SHA1

    9006366f6da38ffbff3bd9b0fdc7516d1c412d98

  • SHA256

    55d28e9c577d54732a546acb9b74a12e20cf25afab9636273abcabbb1a00e83d

  • SHA512

    d7cb7a95cbebcadbea9d733ce1ee7adb9e58f675efbe0ea63241d7977136a42fce92f4d189d3621085d8cb6e692d00e99b1e56586b9b2355cadf6f8c3b35ca4b

Malware Config

Extracted

Path

C:\Users\Public\Desktop\README_LOCKED.txt

Ransom Note
Greetings! There was a significant flaw in the security system of your company. You should be thankful that the flaw was exploited by serious people and not some rookies. They would have damaged all of your data by mistake or for fun. Your files are encrypted with the strongest military algorithms RSA4096 and AES-256. Without our special decoder it is impossible to restore the data. Attempts to restore your data with third party software as Photorec, RannohDecryptor etc. will lead to irreversible destruction of your data. To confirm our honest intentions. Send us 2-3 different random files and you will get them decrypted. It can be from different computers on your network to be sure that our decoder decrypts everything. Sample files we unlock for free (files should not be related to any kind of backups). We exclusively have decryption software for your situation DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME the encrypted files. DO NOT MOVE the encrypted files. This may lead to the impossibility of recovery of the certain files. The payment has to be made in Bitcoins. The final price depends on how fast you contact us. As soon as we receive the payment you will get the decryption tool and instructions on how to improve your systems security To get information on the price of the decoder contact us at: [email protected] [email protected]

Signatures

  • LockerGoga

    LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55d28e9c577d54732a546acb9b74a12e20cf25afab9636273abcabbb1a00e83d.exe
    "C:\Users\Admin\AppData\Local\Temp\55d28e9c577d54732a546acb9b74a12e20cf25afab9636273abcabbb1a00e83d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c move /y C:\Users\Admin\AppData\Local\Temp\55d28e9c577d54732a546acb9b74a12e20cf25afab9636273abcabbb1a00e83d.exe C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
      2⤵
      • Suspicious behavior: RenamesItself
      PID:1968
    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -m
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Windows\system32\logoff.exe
        C:\Windows\system32\logoff.exe 0
        3⤵
          PID:476
        • C:\Windows\system32\logoff.exe
          C:\Windows\system32\logoff.exe 0
          3⤵
            PID:552
          • C:\Windows\system32\logoff.exe
            C:\Windows\system32\logoff.exe 0
            3⤵
              PID:608
            • C:\Windows\system32\logoff.exe
              C:\Windows\system32\logoff.exe 0
              3⤵
                PID:1492
              • C:\Windows\system32\logoff.exe
                C:\Windows\system32\logoff.exe 0
                3⤵
                  PID:1396
                • C:\Windows\system32\net.exe
                  C:\Windows\system32\net.exe user Admin HuHuHUHoHo283283@dJD
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:636
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 user Admin HuHuHUHoHo283283@dJD
                    4⤵
                      PID:2024
                  • C:\Windows\system32\net.exe
                    C:\Windows\system32\net.exe user Administrator HuHuHUHoHo283283@dJD
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1844
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 user Administrator HuHuHUHoHo283283@dJD
                      4⤵
                        PID:1892
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:588
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1116
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1508
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1140
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:288
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1780
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1992
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1384
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Drops file in Program Files directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1996
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Drops file in Program Files directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1484
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                      • Drops file in Program Files directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:640
                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                      3⤵
                        PID:2000
                      • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                        C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                        3⤵
                        • Drops file in Program Files directory
                        PID:2008
                      • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                        C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                        3⤵
                          PID:1920
                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                          3⤵
                            PID:1948
                          • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                            C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                            3⤵
                              PID:996
                            • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                              C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                              3⤵
                                PID:1572
                              • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                3⤵
                                • Drops file in Program Files directory
                                PID:1620
                              • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                3⤵
                                  PID:588
                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                  3⤵
                                    PID:1508
                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:1120
                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:920
                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:884
                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:576
                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:1616
                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:1072
                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                    3⤵
                                      PID:1140
                                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                      3⤵
                                      • Drops file in Program Files directory
                                      PID:908
                                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                      3⤵
                                      • Drops file in Program Files directory
                                      PID:1208
                                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                      3⤵
                                        PID:1084
                                      • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                        C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                        3⤵
                                          PID:1700
                                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                          3⤵
                                          • Drops file in Program Files directory
                                          PID:1504
                                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                          3⤵
                                          • Drops file in Program Files directory
                                          PID:1920
                                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                          3⤵
                                            PID:1844
                                          • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                            C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                            3⤵
                                            • Drops file in Program Files directory
                                            PID:832
                                          • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                            C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                            3⤵
                                              PID:1500
                                            • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                              C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                              3⤵
                                                PID:1392
                                              • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                3⤵
                                                  PID:1984
                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                  3⤵
                                                  • Drops file in Program Files directory
                                                  PID:1472
                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                  3⤵
                                                  • Drops file in Program Files directory
                                                  PID:912
                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                  3⤵
                                                  • Drops file in Program Files directory
                                                  PID:1120
                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                  3⤵
                                                  • Drops file in Program Files directory
                                                  PID:1508
                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                  3⤵
                                                  • Drops file in Program Files directory
                                                  PID:1536
                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                  3⤵
                                                    PID:688
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                    • Drops file in Program Files directory
                                                    PID:800
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                    • Drops file in Program Files directory
                                                    PID:1116
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                    • Drops file in Program Files directory
                                                    PID:1760
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                    • Drops file in Program Files directory
                                                    PID:1740
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                    • Drops file in Program Files directory
                                                    PID:1940
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                    • Drops file in Program Files directory
                                                    PID:992
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                    • Drops file in Program Files directory
                                                    PID:1300
                                                  • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                    C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                    3⤵
                                                      PID:1964
                                                    • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                      C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                      3⤵
                                                        PID:608
                                                      • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                        C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                        3⤵
                                                          PID:1588
                                                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                          3⤵
                                                          • Drops file in Program Files directory
                                                          PID:1676
                                                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                          3⤵
                                                          • Drops file in Program Files directory
                                                          PID:2016
                                                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                          3⤵
                                                          • Drops file in Program Files directory
                                                          PID:1180
                                                        • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                          C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                          3⤵
                                                            PID:1932
                                                          • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                            C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                            3⤵
                                                            • Drops file in Program Files directory
                                                            PID:1156
                                                          • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                            C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                            3⤵
                                                              PID:1640
                                                            • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                              C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                              3⤵
                                                              • Drops file in Program Files directory
                                                              PID:1472
                                                            • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                              C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                              3⤵
                                                              • Drops file in Program Files directory
                                                              PID:1512
                                                            • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                              C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                              3⤵
                                                                PID:1876
                                                              • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                                C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                                3⤵
                                                                  PID:1916
                                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                                  3⤵
                                                                  • Drops file in Program Files directory
                                                                  PID:700
                                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                                  3⤵
                                                                  • Drops desktop.ini file(s)
                                                                  • Drops file in Program Files directory
                                                                  PID:1612
                                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                                  3⤵
                                                                  • Drops file in Program Files directory
                                                                  PID:2012
                                                                • C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\tgytutrc8724.exe -i SM-tgytutrc -s
                                                                  3⤵
                                                                    PID:964

                                                              Network

                                                              MITRE ATT&CK Matrix

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • memory/756-54-0x0000000075431000-0x0000000075433000-memory.dmp

                                                                Filesize

                                                                8KB