Analysis

  • max time kernel
    163s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 23:06

General

  • Target

    33e8cd4f3d71d9fc47417d9f4e4b8cc4cfb74a09bb98cc94e4116a85ec62fceb.exe

  • Size

    350KB

  • MD5

    b352d33bb98d89a440c4c40663a49e9f

  • SHA1

    dcc899f6481c868c8c787b9430752b7dac818f8c

  • SHA256

    33e8cd4f3d71d9fc47417d9f4e4b8cc4cfb74a09bb98cc94e4116a85ec62fceb

  • SHA512

    ac726a5270f82fe5024fab5aa27d001ae63cc6256964bdf9b0c4398fd06981993c83bb692ea72d16ac708ce5c606debc54bb8169ea9245f593e11ce85cd65e9c

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>yourrealdecrypt@airmail.cc</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

<b>yourrealdecrypt@airmail.cc</b>

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33e8cd4f3d71d9fc47417d9f4e4b8cc4cfb74a09bb98cc94e4116a85ec62fceb.exe
    "C:\Users\Admin\AppData\Local\Temp\33e8cd4f3d71d9fc47417d9f4e4b8cc4cfb74a09bb98cc94e4116a85ec62fceb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\system32\wbem\wmic.exe
      "C:\otar\..\Windows\qbmjn\l\kn\..\..\..\system32\agh\..\wbem\xxxk\v\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1176
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:680

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1668-55-0x0000000075321000-0x0000000075323000-memory.dmp
    Filesize

    8KB