Analysis

  • max time kernel
    154s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11-02-2022 06:56

General

  • Target

    53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe

  • Size

    105KB

  • MD5

    467cceb1ab90bf50dc35f65dc513a483

  • SHA1

    907c7792120b5aee6970b4b13747a729fbd59f7d

  • SHA256

    53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718

  • SHA512

    e85f314c33cb521ea3dabec4b2fcfde61a5bab2e5b06a2eb0268f0c35c510318a6510dd77bc2bfa11b7350533adf659895a440ee1496d335843dfad712121f1c

Malware Config

Extracted

Path

C:\0_HELP_DECRYPT_FILE.html

Ransom Note
<html> <head> <meta charset="utf-8"> <title>0_HELP_DECRYPT_FILES</title> <style type="text/css"> body { font: 15px Tahoma, sans-serif; margin: 10px; line-height: 25px; background-color: #EDEDED; } .bold { font-weight: bold; } .xx { border: 1px dashed #000; background: #E3D5F1; } .mark { background: #D0D0E8; padding: 2px 5px; } .header { font-size: 30px; height: 50px; line-height: 50px; font-weight: bold; border-bottom: 10px solid #D0D0E8; } .info { background: #D0D0E8; border-left: 10px solid #00008B; } .alert { background: #FFE4E4; border-left: 10px solid #FF0000; } .private { border: 1px dashed #000; background: #FFFFEF; } .note { height: auto; padding-bottom: 1px; margin: 15px 0; } .note .title { font-weight: bold; text-indent: 10px; height: 30px; line-height: 30px; padding-top: 10px; } .note .mark { background: #A2A2B5; } .note ul { margin-top: 0; } .note pre { margin-left: 15px; line-height: 13px; font-size: 13px; } </style> </head> <body> <div class="header">What happened to my files ?</div> <div class="bold">All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail [email protected] or [email protected] </div> <div class="note private"> <div class="title">Your personal ID</div> <pre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pre><!-- !!! CTpoкy He MeHяTb !!! --> </div> <div class="bold"> <div align="left">Write this ID in the title of your message</div> </div> <div class="bold">In case of no answer in 24 hours write us to theese e-mails: [email protected] or [email protected] You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files</div> <div> <h3 align="center">Free decryption as guarantee</h3> <h5 align="left">Before paying you can send us up to 3 files for free decryption. The total size of files must be less than 10Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) </h5> <div class="note xx"> <div align="left"> <h3>How to obtain Bitcoins<br> </h3> </div> <div align="left"> <strong>Here are our recommendations:</strong> </div> <div align="left"> <li><strong>If you have no Bitcoin address register https://blockchain.info/wallet</strong></li> <li><strong>fill up your wallet some of the ways:</strong></li> <li><strong>Btcdirect.eu - Good service for Europe</strong></li> <li><strong>Bittylicious.com - Bitcoins through Visa / MC or through SEPA (EC) transfer</strong></li> <li><strong>Localbitcoins.com - Here you can find people who want to sell Bitcoins directly (WU, in cash, SEPA, Paypal u.s.).</strong></li> <li><strong>Cex.io - buy bitcoins with Visa / Mastercard or Wire Transfer.</strong></li> <li><strong>Coincafe.com - Designed for quick and easy service. Payment methods: Western Union, Bank of America, cash by FedEx, Moneygram, as money transfer</strong></li> <li><strong>Bitstamp.net - well known and established Bitcoins seller</strong></li> <li><strong>Coinmama.com - Visa / Mastercard</strong></li> <li><strong>Btc-e.com - Bitcoins vendor (Visa / Mastercard, etc.)</strong></li> <li><strong>If you have not found any bitcoins in your region, try to find them here:</strong></li> <li><strong>Buybitcoinworldwide.com - International Bicoins Exchange Directory</strong></li> <li><strong>Bitcoin-net.com - Another directory of Bitcoins sellers</strong></li> <li><strong>Howtobuybitcoins.info - International Bicoins Exchange Directory</strong></li> <li><strong>Bittybot.co/eu - Directory for countries of the European Union</strong></li> <li><strong>write to Google how to buy Bitcoin in your country?</strong></li> </ol> </div> <div align="left"> </div> <div class="note alert"> <div class="title">Attention!</div> <ul><li>Do not rename encrypted files.</li> <li>Do not rename encrypted files.</li> <li>Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.</li> </ul> </div> </body> </html>

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 26 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
    "C:\Users\Admin\AppData\Local\Temp\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      PID:760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
    MD5

    694034feb1457fc087fcf8bfdbbeb1a5

    SHA1

    c2732292c3d8b9e39b5e09e2fa0c07a9523201db

    SHA256

    a65f644e5b9be65233b0e826ad5f8ecfd0f084c656a667c91fd7405dd98b5c48

    SHA512

    3ea14a798cc7714e354c7ab0cbe690f58a21b3c086a16593a3a6d2a079bce1b7d74fdaf270037b3cb4af50024998491111c376ad0f372fe872dbb0f6ece8b428

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
    MD5

    694034feb1457fc087fcf8bfdbbeb1a5

    SHA1

    c2732292c3d8b9e39b5e09e2fa0c07a9523201db

    SHA256

    a65f644e5b9be65233b0e826ad5f8ecfd0f084c656a667c91fd7405dd98b5c48

    SHA512

    3ea14a798cc7714e354c7ab0cbe690f58a21b3c086a16593a3a6d2a079bce1b7d74fdaf270037b3cb4af50024998491111c376ad0f372fe872dbb0f6ece8b428

  • \Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
    MD5

    694034feb1457fc087fcf8bfdbbeb1a5

    SHA1

    c2732292c3d8b9e39b5e09e2fa0c07a9523201db

    SHA256

    a65f644e5b9be65233b0e826ad5f8ecfd0f084c656a667c91fd7405dd98b5c48

    SHA512

    3ea14a798cc7714e354c7ab0cbe690f58a21b3c086a16593a3a6d2a079bce1b7d74fdaf270037b3cb4af50024998491111c376ad0f372fe872dbb0f6ece8b428

  • memory/1652-55-0x0000000074EC1000-0x0000000074EC3000-memory.dmp
    Filesize

    8KB