Analysis

  • max time kernel
    153s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-02-2022 23:41

General

  • Target

    March 4.scr

  • Size

    812KB

  • MD5

    5181f541a6d97bab854d5eba326ea7d9

  • SHA1

    16d9967a2658ac765d7acbea18c556b927b810be

  • SHA256

    b7f96fbb9844cac5c7f4ec966683f3564bbb9a2f453927e1c579dcb0154f5f83

  • SHA512

    c282d9d6479c10fcc9fa6f674c901df1f1ad94b9354f6e427a7b445d0efad84efed6d7c29a0bc2a37b5ea07ee9a359f0e922d7c24f061258ae11fe4c44e9e4fa

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: [email protected] Reserved email: [email protected] Your personal ID: 6B3-226-291 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\March 4.scr
    "C:\Users\Admin\AppData\Local\Temp\March 4.scr" /S
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1076
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
        3⤵
          PID:1488
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
          3⤵
            PID:308
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
            3⤵
              PID:1704
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2032
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1836
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2036
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1588
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1084
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 0
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              PID:1604
          • C:\Windows\SysWOW64\notepad.exe
            notepad.exe
            2⤵
            • Deletes itself
            PID:1560
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:268

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        File Deletion

        2
        T1107

        Modify Registry

        2
        T1112

        Install Root Certificate

        1
        T1130

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        2
        T1082

        Command and Control

        Web Service

        1
        T1102

        Impact

        Inhibit System Recovery

        2
        T1490

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          43391b412c650cde148653f76041c4c9

          SHA1

          f01dede729775576d9b3f4055bcb2f266c6260ed

          SHA256

          563836a148088af7fd35407fdb197f3b03198f89d7b44ec21efcdf87e03735ad

          SHA512

          593874dcb37de114829dd0de6ea879324121f898d9201a4ed26668aa9b77886e0afb7103dd3e1a15a42d520b1987ec0ba116e371610093fa03b7649b0056e716

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          faa285bde2e487ce7d9b8419e5d68449

          SHA1

          bdc1d3d2f283c23954406f01c453774b41c4cff3

          SHA256

          76f585d5e0ac3247f817f02d521b6c169f068062c693a2ad800426ef4f67e2c2

          SHA512

          95647b54124efec096c4e65225c758a234f284b641b58d861a7733dd9c183807a523b17d652d573d654113d7cae3cb1c8bbcd990a53779ed86d0887a9d56723b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          09c39cd47a026a9f730cedcf0cd6c086

          SHA1

          c496f857cdd321b0c233908e5cfca3a2741774db

          SHA256

          dac2163db6f8f5efe2040c00e1af9f71605f892ea29a858f8b95cd5469a74e3b

          SHA512

          722839ff8035ea20e14bdaeee553ecfcf8679ec7800c3f826163d3f978eb933c662fa3c66178a84463fd3aa6cd78469d275a26e0779b00b978665037d4736bfa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
          MD5

          b8d8dd21f3fa1ea2e33bfbf92dcb095f

          SHA1

          069f45075eec0f7f0083da35dc57974a3c9688cb

          SHA256

          c1e4bbe914b8a4304b6d3bbdb0a9f8be83f87889b25faa9ef5aad0b6a856a463

          SHA512

          dc04f3da4522e66f14d4271471c065aa95b0d5629ee32eae1eb4335e9e4c68c1426dc11fd1d67608a3a2b5e96877842cd3d68b7da41d802372475b73c8ca838a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
          MD5

          f756f14771204f3ac582c64838e62f6f

          SHA1

          5a17ba1a74e4e4f789f91d01847cd69329192f75

          SHA256

          5f60ddd57be65ed09129d5fc54281412e19fcc5c67ee27674c069f9c2df3941c

          SHA512

          28cbc59f2a6b161c5908109497513f9e1b72f4d00bfff7e0aee9e44fffa2f40efe0e2e345aff5def40bd32f84263a427e33b5407ce6e768fb3e4d1713aee01d1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          a6831ae5eccf412b7a6b09cad75e706b

          SHA1

          aae0a6e0404bf929c0d40383b2e9611b8c5fc423

          SHA256

          fdc4c4d718b9d715d51f58a47e31c8577e1d1732cb980e4674b201cbfe640ff5

          SHA512

          772bfca32958722fa09619baa8c1092bd17ea32e048cd387d80c6459e92467bc710b9882ea4e9b45da81c2641c9cf0dd0b9a748522fef222a232f48ad25d8cee

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          065726dfc4593ee210787d9d922cb7d2

          SHA1

          c60ed15a30cbb7ab28bb102a16ccf0daa439bb41

          SHA256

          b0aa7310d28ad2c50d6a3c70a265b985b93e855386098d3e11b72d7ca2d4fe19

          SHA512

          394157f78b794a4f923d9b42f3c9959b1e3a4f76b57f3e0673cc949580405634b6410cc9e7fa99f8df97603630b9c3063fa6eb7f349608658b34ff0d5e6f99cd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T7QQD7BH\H74KYIY4.htm
          MD5

          b1cd7c031debba3a5c77b39b6791c1a7

          SHA1

          e5d91e14e9c685b06f00e550d9e189deb2075f76

          SHA256

          57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

          SHA512

          d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YFMJZ4T6\TVDX75K2.htm
          MD5

          8615e70875c2cc0b9db16027b9adf11d

          SHA1

          4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

          SHA256

          da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

          SHA512

          cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

        • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
          MD5

          ef572e2c7b1bbd57654b36e8dcfdc37a

          SHA1

          b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

          SHA256

          e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

          SHA512

          b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          5181f541a6d97bab854d5eba326ea7d9

          SHA1

          16d9967a2658ac765d7acbea18c556b927b810be

          SHA256

          b7f96fbb9844cac5c7f4ec966683f3564bbb9a2f453927e1c579dcb0154f5f83

          SHA512

          c282d9d6479c10fcc9fa6f674c901df1f1ad94b9354f6e427a7b445d0efad84efed6d7c29a0bc2a37b5ea07ee9a359f0e922d7c24f061258ae11fe4c44e9e4fa

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          5181f541a6d97bab854d5eba326ea7d9

          SHA1

          16d9967a2658ac765d7acbea18c556b927b810be

          SHA256

          b7f96fbb9844cac5c7f4ec966683f3564bbb9a2f453927e1c579dcb0154f5f83

          SHA512

          c282d9d6479c10fcc9fa6f674c901df1f1ad94b9354f6e427a7b445d0efad84efed6d7c29a0bc2a37b5ea07ee9a359f0e922d7c24f061258ae11fe4c44e9e4fa

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe
          MD5

          5181f541a6d97bab854d5eba326ea7d9

          SHA1

          16d9967a2658ac765d7acbea18c556b927b810be

          SHA256

          b7f96fbb9844cac5c7f4ec966683f3564bbb9a2f453927e1c579dcb0154f5f83

          SHA512

          c282d9d6479c10fcc9fa6f674c901df1f1ad94b9354f6e427a7b445d0efad84efed6d7c29a0bc2a37b5ea07ee9a359f0e922d7c24f061258ae11fe4c44e9e4fa

        • memory/1080-55-0x0000000076371000-0x0000000076373000-memory.dmp
          Filesize

          8KB

        • memory/1080-57-0x0000000000400000-0x0000000005678000-memory.dmp
          Filesize

          82.5MB

        • memory/1080-56-0x0000000007120000-0x000000000C37C000-memory.dmp
          Filesize

          82.4MB

        • memory/1400-76-0x0000000000400000-0x0000000005678000-memory.dmp
          Filesize

          82.5MB

        • memory/1400-68-0x0000000006F90000-0x000000000C1EC000-memory.dmp
          Filesize

          82.4MB

        • memory/1560-61-0x0000000000080000-0x0000000000081000-memory.dmp
          Filesize

          4KB

        • memory/1560-65-0x00000000000A0000-0x00000000000A1000-memory.dmp
          Filesize

          4KB

        • memory/1604-80-0x00000000071B0000-0x000000000C40C000-memory.dmp
          Filesize

          82.4MB