Analysis

  • max time kernel
    187s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    16-02-2022 22:46

General

  • Target

    9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7.exe

  • Size

    350KB

  • MD5

    a0dc59b0f4fdf6d4656946865433bcce

  • SHA1

    c10fd0163c42f1149d5dcfb44e31b53a4fe6c6c9

  • SHA256

    9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7

  • SHA512

    37ca081cb529aef7facea47985e88ce2a8011f2a7a89978a54152c688b77b974326ca8ab27012f0d05866a20f5fb961b65309a26fc3eb49b487f3b0e6216abff

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">H8qJ8L/JDiN85Wqs3jsqm8uHHA44dE5VEVsKMiio1lJYfrgLX/lCzNG4ddmbXD3SgR1YcQZ2ZhOsmXESOTwoJ5JgLpjcfmB1utTNraFw2kzwFExJ8Ce72UUk/Frkgygh7twy+NeF+hb2GFigl30BaP1bfafqnBkLXYzVEYqw5BN8DWwDTxQfeKfEO76qKnUErbjHmJOOMfY72XfrimW5MyukX2XFO08mVltVtgyJ5ufaNvl+8FjWbw8+Gqp26P38RpHsoGqn33lXJ5txQaaKanwXIOITb0ohmFGRfyRHM+ACj6o79Gi17Td/oqWyh+l5symSQQbTCymF4x48mzr//SGzoF0z2yAf7UcFFBuIJ1UmyoFj3vgqTV7kUtrgzz6BNppeVwCAcnXqdTo/4Mg5pr5uoY2uuVURZTEBnjzarQD8dC5GtrmTJdIlqfgHCTN3ER9fT74QL3HJSBpAqimAo0ziIUZrMu1gyUsU2vz2uUXWYXW3nrGUpYpe0txYKD5eIaUgL/xNxXt5deaYEEe1aKlLBpZuB76NT5GAJLCVLXir5FUwYvxpaJc6gpKCAtBZRTkk0RyrNUtoHjHa5+eiSyElezhTicmo6ktrim/Rh+5eBE+BRNsUwgs2nxOjWzJDQvW7uIl6NrDWtb0/U7hqwLn0ANp41S8VSed6Cgi5F3RnvEquHBX1QOdrpqL3lDGnIR97n7PqfIuPQZDrry/mEv4TBPDf49sf+L+LtrIQVuM4OKqI1SeMJxnz97q/GC+SUfjO+f14eKNN6hv1Yhz36LB+v15Lf8/kIZclZsfQo1HX2t/mJDsP6QAzqXajh1h7ppiqKXjPAcHTsFxjS/0I6FHuQl73B0S1CKuIyL4SU3OuJYFNYm8BAt02CxTpgN6fb51xfapESNUKlAqzdIHDT88jwM0AmxQRK3WhxhbX7lykd3YL8zqmDfbvsRA+kcEUMJ9t4OeStnjCkQa3apGmUzQTCMfyGDZM25qlHnI0JwVGcJtv1JgGN0zthx6P/Sh3g1obE0W8f728kTLtDiZXfHtZl+fw9LeHBavsKavUYVizEtzL6mIjyvXI2lXaLEKpEI+WqizoaM5i4eejtZo7a6q8JYdruHILouJg6COY3Ock6x4o1j7sfLpbFxBwB+ajxGGAEzN3/3PBmi6u6vHgycSGBdNwMcrIVvBTNEHtuqaY/gZw6GKzNlY+L0Cdq6jTpKaHCwZzf/inuUMYCP3PCF7n/wPru0MO9m4LEaEGPt9btwbNwZU9L2B0pn3iy1tAE/Icee108vzWEUIxHx6Pt6QBVIJcfHrG3exCirLwV+32JaWvV/Xh9QJrCUsHT4CHODuI/HnCBZIUCMYFVQj03KmSAE6OF0yAAMonVsq0Lz/bJ8cIA0sUIlEY7noRHT7HGi1B7oo6Db9xnPgKl2fR8365jt1JgNfd3ikBcwb4HcXnAUP0p05hIoldUld5VVy/QDSfGlmNT8CIcXS3a/XFJWJRjjKL6PKMc11TSdfTRYxYDWgibMue7TtoYzMtn8fxQa1C56BKfoCAJwf0TeTzvz3xeLn28A8NgvoZjOt/UFxT4db3Xd0NT5XEckcC5GTUpfZ+1ZiZV7+W/ecLXTo5bLQovObL3hn9Oefe8qQt/uG7QWOBF7RPRmpkUL5qMBEKtufVesnTFcyakBSbSoMkxJ/ERpi9q6nc9nfVx7O17OsYO2wgIoSblTniL3kfAMmJ5dCBy+Eg6H9AFs6gxRLvzPbih/Ek1fzsgFnXJ4WVXXMCWgJnkYrQRqMzl6VhU8Jyq4/EFeVUNKMmF7NqK6ePH+p15wX27szmFFT3HVZkCCrMOIbwE1n4wrmplFKQ30lfdeILGd7ryipI9PjMIL0ETd+PCH4eLv2hO3HXQ2mpg5yajPqEW1S+Fwkg/EgxMOyc0V1C2RCWMrW4atYT3OzUPg9VaRQGTXkQoXDXTjvRZIe1eq8W+LNDi3VoWwYFdY4ntNqB1vyxNYk3o/J9uBPatdkF+F4U7nINlZ+XMQhwze4Ak5K8gD+fWzwIk8o2OU+bC51O/rkRcr1A7l03JzX0YewFeZXtLTVmttx1++dxSIS6ZEKiujSke7URD1qttQa3X1kIDX89t9qsAOAEN4jfzZk+Y5Tan9tJe0LO4uL/QfcfOpqGCNOOgXw5MGZivbLGltdcGRGmUKVC17kgvqqwUvTzFHxTCeKKexafwcZBfLfTNGqVdIh2sOnBopOclwuzW4Y2MgoiOAA3ADUAYwAwADkAOAAzADkANgAyADUANAAzADEAOQAAABCAYBoMQQBkAG0AaQBuAAAAIhJSAEkAQgBDAFEAVQBIAFEAAAAqDG4AbwBuAGUAfAAAADIsVwBpAG4AZABvAHcAcwAgADEAMAAgAEUAbgB0AGUAcgBwAHIAaQBzAGUAAABCNnwAQwBfAEYAXwAyADAANAA4ADAALwAyADYAMQA4ADQAMQB8AEQAXwBVAF8AMAAvADAAfAAAAEgAUEBYiQhgiQhoiQhwkaK9DngDgAECigEDMS4w<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7.exe
    "C:\Users\Admin\AppData\Local\Temp\9d86beb9d4b07dec9db6a692362ac3fce2275065194a3bda739fe1d1f4d9afc7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Windows\system32\wbem\wmic.exe
      "C:\bray\t\..\..\Windows\t\..\system32\avbm\dcp\wcc\..\..\..\wbem\vdy\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2372
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:2016
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads