Analysis

  • max time kernel
    173s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    16-02-2022 22:39

General

  • Target

    c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe

  • Size

    777KB

  • MD5

    a5de1b67af09381692eea756e05b9657

  • SHA1

    ab91d51cc1e17f3f4f5d384c53f26d867b25916b

  • SHA256

    c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e

  • SHA512

    03ebc4d716aa2927eca82225be8477f0437e2d7ab9fb9b8f4be93868ed0d4b81ef9329ea19c7eb177dae607c6fd889928984284722503675c22e5158b3c3bdf9

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe
    "C:\Users\Admin\AppData\Local\Temp\c68d8ab7b858e2cdbb9a7f4bf08ea1548dd376493128024f6680479a839da12e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Windows\system32\wbem\wmic.exe
      "C:\h\p\..\..\Windows\fywge\kn\nf\..\..\..\system32\vioa\ao\wxof\..\..\..\wbem\w\uxm\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4256
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3512
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3512-130-0x000001BCA5920000-0x000001BCA5930000-memory.dmp

    Filesize

    64KB

  • memory/3512-131-0x000001BCA5980000-0x000001BCA5990000-memory.dmp

    Filesize

    64KB

  • memory/3512-132-0x000001BCA8040000-0x000001BCA8044000-memory.dmp

    Filesize

    16KB