Analysis

  • max time kernel
    158s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 22:45

General

  • Target

    9fcab81f339b7e009a40e9f263f8d2e56fcf1ec5fc230ee47c69e0b672b7c272.exe

  • Size

    381KB

  • MD5

    6405a2a713548111aa9a1a807fff6df5

  • SHA1

    a8eb4ee46b792072347a73b21fad832f200128c3

  • SHA256

    9fcab81f339b7e009a40e9f263f8d2e56fcf1ec5fc230ee47c69e0b672b7c272

  • SHA512

    f0b576ed89c04541b7a6a2b5ff8a5ab7c8911ddd3573c9653bf536d337e9ef219c9465372ba061e5133ebb38feeebfad1a9e9d25c9fc9471c8c10ee0341747a0

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">TadmhGOBNfJH8gZy4VPtPKaMhVNZ0pSTXJq3XiQ17D5rsYTbjE+TUgwpB6D2XaXMrHnKPkUfStsRtSaxRzrHTwXvokt0oq3vrbxQHw1rymmO1nC9Bkv72G780oJ+74rdBeNjMkNYKmTzq3JCN6CiopSg/zfCMDKVyU/LDELL2q63oW17ccIOWd46DSgTx87GYSgrM865j95AH29knjGN0sOm74l4kZaixq3YOo+c5H+jlNn3NQ/tySnn+FBhh09cx/lSNymOBEM7u24as68d/LgYW7onbw6+nAFduXGWc1/RWP4SwRFHvKYJbbTddEK+ujx+TIE504mOYAN5NUdDiyy2orauClGcz2Js5xkryh9B+Lnki6XrJKHvDvHQun47MVGLrgcMHuPW9PF2nP3ExPvKnGNBFpICxPB+s85RcpMU4MPpsjU5WRjmtD3aSJCCI5rQdeLAxkzQvxc7WRo4Fhy3aoy9+L3pFOELGBs5wyIMzjm2NhV6s8vh/Ypd+ZTUnwl8NTYfN4g4rmA/R3IvxbRKnJIa3hPG3030uQUsqc2GiP7nQvpZQK15Cv5VKIocc0c3ZR0Fv8ucANO7P9XVvVW3dvmLRM2kQ4ZD5hDsQMhtzirA4TmkaGlIRCOpmJYo8gXt0ahJXo0CYxrwsYcFgYr5oQDxjg/974SkbLrZps8508mTX9TD0+KsleVUrkA6btKsu3lxBBZDH1MD17BKezd3rvEAViQ6WPRuoEqXMHpCoDaQ4GiuZZXEP0WPsg6mTrBdxDeqnn0iKKmsvaNf0n45NtjFcgiNDry8S38eTNWfmEtvCGm+89qUQ4AURzI7JS9LlCKd8QJi7i59Q1upiZ+LjSz+9TvxA/ubr9oqSgL1f8NTr5Z0qZAIdBWTS7BuwSosnXziteyJUP0ZiCSIJMViVJShKOxrLeOhStho9GqhTT0flN3jzn/nd4i4znEUBm7uieuSSiyTBmzFtZpfaw20XpqWAVcbN9FCwS5r+QCtYmbDNq68YkO/OKiYl8tRqZYTXRuD9Sujg40nbU5K3+H+8NTkWzJvdzFQKyMkiLxFFU6kFBhZryKXMwvwBE9X0lwDaAKAN0SpO/kfqofxDaw3/GPh6sRqIBSUgD2rEMqU6dfDhNURBJK3F0fCpf0eYeZZz+OHS78NoQ+F7XAERVzxBodkvBPThfavOHUGVNxfihPeZDg/xBeYtl/LBYU8XjRRZa3UzSvVa7JFAbp7vtYtyVAEYd416H5T46AGgTwLzOx/qx7h6NBZPuIPEJ5E5Sh1DncsIUOid/dCSQPIwbk3fTm/Oj5iW46Fm3jx4NbU5xux1MHlpzQeDyAK6IEdjErCS+hB71PnGxCSAjNygDKRdGQNVebqB8JWafjRVICJPqmZwKE47WbXxKjDcqh9GeMzQHDN1n4/rp9xuMvxyb0cfFmqQq6BAlu9FzXIk7T/4JwF49mekGZcydpCPjGj46d64+A4kXZrhI0a1Mq90mzDQtKCMGxdyupht8ARxx8q0YpnaNLkovm+GqPiXE+bhh+FARPRH95U87e1sIS0ChhbcvwxEm7JryM0fLBKRue8hQjm5X5c1fXRE2KgrGvRFHAG57zYxnEbCAA6GBhzya5GJGB2JfTskMfSXfkJrlDaVeUq/oBMsUPZejUSzwqcRLVzns/egjf7nGJO+dj8z6cCUZBgXvKlDSK4DlpcYB5G2BxUXA3b4xXmlZnfqFUIImKeO2z3ji7YKMLTHyvyTIp2pfcFz6xRORiiMwA07Dv8lwKpbxrTbzYovh4mA4WLehsVsoyKpeFGsPJ/5AlDnH0UxqLo0nIfd4qA+exosktpQtCLPacAm1Wa6oyoOdfSw3cAg+HZT4SN7kvTp3MdLy8Ysu3FRd1fYzwoXXz3ZZgpRnCBfiPEngeydfVdGqY0CK00b1Amt1sshrGSCQN0972UA36hQxWFK/CuK20qjRh2bgufU68Q9U6uW1PwKjiMc6APf6XIBZLiYu5Sa7Zvf4foSlN3z30pyB1rIKpiq9g1GK/oYaOkKSLrpJ1nyr8TLY9brwc4rpIkkRs878JWgTaccZvdMpYMeDeWTUkdqNB98om3RkiY0+H+/noPbzyZ1g9jZNQXUOunmcdlJ29PVC9tHigpPZ4IOoSJw/GAuuU6Ud3Zray18wafIqHBzEfsK+/1IXZvZAwVCswXpuSqNQedcGE8i5aEPqc8Ir/VtYEm9DViAbw5DwGB0UgGQjIpAlt1cgoiOAA5ADIAZQAwADkAOQBjADgAYQA1ADEAOAA4ADgANAAAABCAYBoMQQBkAG0AaQBuAAAAIhJWAFEAVgBWAE8AQQBKAEsAAAAqDG4AbwBuAGUAfAAAADImVwBpAG4AZABvAHcAcwAgADcAIABVAGwAdABpAG0AYQB0AGUAAABCNnwAQwBfAEYAXwAyADAANAA3ADkALwAyADYAMQA4ADQAMQB8AEQAXwBVAF8AMAAvADAAfAAAAEgAUEBYiQhgiQhoiQhwyZ/Ye3gDgAECigEDMS4w<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fcab81f339b7e009a40e9f263f8d2e56fcf1ec5fc230ee47c69e0b672b7c272.exe
    "C:\Users\Admin\AppData\Local\Temp\9fcab81f339b7e009a40e9f263f8d2e56fcf1ec5fc230ee47c69e0b672b7c272.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\system32\wbem\wmic.exe
      "C:\klt\g\phl\..\..\..\Windows\mw\jci\xb\..\..\..\system32\wkg\..\wbem\xdc\xdn\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:760
    • C:\Windows\system32\wbem\wmic.exe
      "C:\dmyb\lbvq\viwd\..\..\..\Windows\ki\skgpd\pq\..\..\..\system32\jyleh\gih\od\..\..\..\wbem\r\wtlh\t\..\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1540
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1836
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:1632

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1600-54-0x0000000075CE1000-0x0000000075CE3000-memory.dmp

      Filesize

      8KB