Analysis

  • max time kernel
    172s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 06:37

General

  • Target

    b250e3ff68a6569eda6a288ad09bffb4ecb91bd7672e4b99ced95ca98a6d43f6.exe

  • Size

    55KB

  • MD5

    e82149cdc0027e71b501e5a1ff4c0f56

  • SHA1

    30ad88dfb0cf17dba6105f6651672727722671c1

  • SHA256

    b250e3ff68a6569eda6a288ad09bffb4ecb91bd7672e4b99ced95ca98a6d43f6

  • SHA512

    16be4c398ad23fdb1deee32f4f85a7e2d173071ed24e863092a0de5368a0651ce0f704339a976e22c292de308b8df31bc4741d42f83d6a807c1eb19d28495b68

Score
10/10

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 5px; color: #FF0000; background: #303030; } .tabs1 .identi { margin-left: 0px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top:0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>��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p> </pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9763; Your files are encrypted! &#9763;</h1> <hr/> <h3> &#11015 To decrypt, follow the instructions below. &#11015 </h3> <br/> <div class="text"> <!--text data --> To recover data you need decryptor.</br> To get the decryptor you should:</br> <p>Send 1 crypted test image or text file or document to <span> <font color="FF0000"> [email protected] </font></span></br> (Or alternate mail <font color="FF0000"> [email protected] </font>)<p> In the letter include your personal ID (look at the beginning of this document).</p> We will give you the decrypted file and assign the price for decryption all files</p> After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions We can decrypt one file in quality the evidence that we have the decoder.</br> <hr color=red> <center><p style="color:#FF0000">MOST IMPORTANT!!!</p></center> <center><p style="color:#FF0000"> Do not contact other services that promise to decrypt your files, this is fraud on their part! They will buy a decoder from us, and you will pay more for his services. No one, except [email protected], will decrypt your files.</p></center> <hr color=red> <ul> <li>Only [email protected] can decrypt your files</li> <li>Do not trust anyone besides [email protected]</li> <li>Antivirus programs can delete this document and you can not contact us later.</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> ��������������

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 9 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b250e3ff68a6569eda6a288ad09bffb4ecb91bd7672e4b99ced95ca98a6d43f6.exe
    "C:\Users\Admin\AppData\Local\Temp\b250e3ff68a6569eda6a288ad09bffb4ecb91bd7672e4b99ced95ca98a6d43f6.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:3420
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4868
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3916
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
      PID:3116
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
      1⤵
        PID:1168

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3116-142-0x000001DCAAF70000-0x000001DCAAF74000-memory.dmp

        Filesize

        16KB

      • memory/4868-130-0x000001E25F7A0000-0x000001E25F7B0000-memory.dmp

        Filesize

        64KB

      • memory/4868-131-0x000001E25FEF0000-0x000001E25FF00000-memory.dmp

        Filesize

        64KB

      • memory/4868-132-0x000001E262420000-0x000001E262424000-memory.dmp

        Filesize

        16KB