Analysis

  • max time kernel
    168s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 22:36

General

  • Target

    daa0ac4896cdfdae324b228d5c620fb3ab4a33ff73d991a3587a086c7ffb5e93.exe

  • Size

    426KB

  • MD5

    e07b67ebfd8b9628237a9cc955a136fd

  • SHA1

    c623d17c0bbd9fb753328c8d38068ab57f9b9758

  • SHA256

    daa0ac4896cdfdae324b228d5c620fb3ab4a33ff73d991a3587a086c7ffb5e93

  • SHA512

    a3061c67c6ce4d982a4de514c891e3eb1ebe5a5bd471292407921e86f3336f8a7e1e3d2beae353c468b399a5d5b22e5615d1b5c78db19863bb7f410d61d11afc

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">ivWXlir9/tMG52qiOu6lZe5cm9Fy7Oq7EWupZWrFku6LG+PtbyLYRMaRwQKaZx3nO/+QdEMp/0XRc5RrDdi0HuQPnWFRYm6nM9sEvWXdFUXCeTNB49hzFjuU+w8AJmHWHcCnyhLIeLYL8CGhvh/jcpeCD1J9aNzHXPRzakbUexAXUxcV9NXQqA49d/7muqHF6SboiL4CzAHm1yfWEDfoOlfKjSz4hBlDRd/hFTW6tvvACYcjiIyvBcYc/JQPiX5S0M1y+JeJBIt8ENgWJUEgSqfGESURK16sRCokYPHHzeXoXfFR2s+r1tmwUL7Tsw/L3PKlw5zC/1MyUKdrXYCrsiSnwn99av+UOXof7XNy9c+UB8lMLRdxZ1Ro5jVlEuFO3Kl/SRn8FSbIbUwvp/sQtabroFAwoRzKY8xHsrBdNZQg26YIz6lnXFFejrsxS3o3F40acV+emb5vfQ2YLqdjjEQA9iAH+DM12uaWMNlerhF0WGO7q2IwYj5edbMrFMnk34mE+S1K0Z2X5BsExeHqx3T9Gmg6tWYxNDQQNVFSgGb5HHBF2Pha6iq4nyQXZdYtzQTBmEGKqYQibQfaHNC9gUWdJE/X2k2uuQpWeEpZwbNCl30ZUQtyjh1gptOZ13rjm3Q2lyiEylyyQFd0aNSvC0e+tGRZo8o8QLibg46HcnpTYstdZ88XuE2FAPvAAS8mWZoWVcYJaMjiPZRk3ieR9vVr0KcgcKuUwZyo4zrnr72wq07BUFKQZq06KuVtFKzCL8RFAXQq+RYFUZdgMsYQgQ947XJetQAFoFYGYjzvt2QsbLanaRGxJZ3m7qTsRsbJA+MrPp6F040j2xz3oNuXRRjcDEtg7FU6tDXy9INuhzqfHTOBxAObTwzp5VfD4theosXIPu+45z4Hp0+ovtHEY76JTz7I8LsbMo/SY6UCEp8VcoEmpUDOmUlWyxxGEw3Ms47QFhg/757rM273oot2v2j1UOQ0EPi6MlQMx9/9kORK2En0eSUpIuILMAMxP/5BGA/qh2AgCCByzLm/q8XYqiYJexT8jhBLeFz3juUyMDq8uk3+Va0NdeQ9kyk1reOuDtvAMvWgSEDe4w35vuE/cCgEogsbw4jvQ+em+wRdayqXP5Afius5Jj3/qyw9xjAw0l7+jDBpHWOaqeugTEsqgvTvf5eKlmHr1S3qTRnj2DY63cgsOl460QaNxfhUAz7QL7T2gl9cpZ8gJJJo5qFv2OPdVWKGXoiHRAoT5Uj1YZfkyIxnbyfYQQNrSoFB0L4MJIvbW95HLT+7znyr0GsqV+dC58QrXW7V3C5NVgcii7StCQf6kHHAOurLVpXu7TsokEZl9w7ts9UI43Jkmt+oufoD+HRbACMAaMXJQBQvci1hPw6R1SSNSZLW6GqqPxi9W+YCLKraRyZmXZRVQSlAZrYFSC6vgAS7i9dOmBZa6jcgaU8gHSU+YJk87pD/0ob7udcelQrDM88qij1JmevgIj0Yr5o621dZXlZPV9tnCO634jHMHCA36wC5bDsYaijTg2/5C3bJO1R7JavNvG3pLcFYWDyLzy7iHnEe7BL/JiWcSgS9WTVo3FYHbwuQadcfnfac+sWY/cXqjYVuPFt6niTWQTiwaj3qPZlz6PiZWpJDrJYbPuC/sav11iR+DufiH/rRR7VImyMw55TsSRbpnU/ls3CqNo2gdmO9r8xOJoAlAjr86FW5Ag0uZ7XgDOM2iZ+FxBRHTLYTsVLqd8k79Oi0M/p2Q3ydzeSqfgX7e6ZGlyQ0cTkrmV4eZbeYPQIasLUaljNCaVzZRN8+jwDAsZ5daYM9qggxpDdjgHtIoI6EB1RPZJXR387yxPDFx6p5cWknvh4jqSwDa7KFEncx6Y0jd6V/xYmbzixDLjbnCid+RExtdSfJnWC/cDgnuT8QhYfR8Y1NgVLYEDBYXU6++PX/87ll7njZ735mOaXr6biyc9G1oX/Bqb4xxfEbBy93djtWvHi1KM7cKBBT6qpYDaPn58zHq4MyMadkOYtn8HumMqlr9mvNq6Wr596ofdiC39S+i/3JbB402n4uYavheAOrBM/3Z/oQqyWfy3IuRvd/pY0GgQ/fvG5M0UDK5h/I2Wb4sK6nlN+JD2kE6Duup6nz222L1rluIwpo3hvrFMhgJQQ6jl1YJ+du7zX3OzrKhUw0NG8+wiOBqFl9L/EMvfJVu6E3iQZzY+tUdKnwHJOgu5y1/c/ErNYEoW0oecIjFTbzrwoiOAA5ADIAZQAwADkAOQBjAGIAOQBlADcAMQBkADMAZQAAABCAYBoMQQBkAG0AaQBuAAAAIhJWAFEAVgBWAE8AQQBKAEsAAAAqDG4AbwBuAGUAfAAAADImVwBpAG4AZABvAHcAcwAgADcAIABVAGwAdABpAG0AYQB0AGUAAABCNnwAQwBfAEYAXwAyADAANAA4ADMALwAyADYAMQA4ADQAMQB8AEQAXwBVAF8AMAAvADAAfAAAAEgAUEBYiQhgiQhoiQhwlJHZe3gDgAECigEDMS4w<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daa0ac4896cdfdae324b228d5c620fb3ab4a33ff73d991a3587a086c7ffb5e93.exe
    "C:\Users\Admin\AppData\Local\Temp\daa0ac4896cdfdae324b228d5c620fb3ab4a33ff73d991a3587a086c7ffb5e93.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\system32\wbem\wmic.exe
      "C:\ur\..\Windows\bg\mu\qujq\..\..\..\system32\k\h\qg\..\..\..\wbem\be\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:544
    • C:\Windows\system32\wbem\wmic.exe
      "C:\afj\..\Windows\w\yfi\..\..\system32\cluo\vjitl\..\..\wbem\mfpqo\ddj\yadk\..\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1100
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:828
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:880
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xc4
      1⤵
        PID:1160

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1624-54-0x0000000076071000-0x0000000076073000-memory.dmp

        Filesize

        8KB