Analysis

  • max time kernel
    171s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 22:39

General

  • Target

    c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe

  • Size

    777KB

  • MD5

    a5de1b67af09381692eea756e05b9657

  • SHA1

    ab91d51cc1e17f3f4f5d384c53f26d867b25916b

  • SHA256

    c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e

  • SHA512

    03ebc4d716aa2927eca82225be8477f0437e2d7ab9fb9b8f4be93868ed0d4b81ef9329ea19c7eb177dae607c6fd889928984284722503675c22e5158b3c3bdf9

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe
    "C:\Users\Admin\AppData\Local\Temp\c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\system32\wbem\wmic.exe
      "C:\rhr\nw\usuhh\..\..\..\Windows\byhj\ppi\..\..\system32\cq\s\siw\..\..\..\wbem\bifo\sbbav\ba\..\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:696
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-55-0x0000000076731000-0x0000000076733000-memory.dmp

    Filesize

    8KB