Analysis

  • max time kernel
    166s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 22:51

General

  • Target

    7dc5561778965eb8caba07ed32d5a683dd4acc8731e56525c1931363a3451c23.exe

  • Size

    455KB

  • MD5

    c7ff4562fa2f817435f54ece870eab73

  • SHA1

    49d2bcd881723f239b66dc6eac8816419e86d486

  • SHA256

    7dc5561778965eb8caba07ed32d5a683dd4acc8731e56525c1931363a3451c23

  • SHA512

    bbe34ea8cf5ff1c8ccab6b3b077238923f005555c2137dfc6b7ad8e2eb4ac849f8145dbaa3029d192f0af0358bab82bf588c3b9e7109636fd7a928ab1e8cc5bd

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dc5561778965eb8caba07ed32d5a683dd4acc8731e56525c1931363a3451c23.exe
    "C:\Users\Admin\AppData\Local\Temp\7dc5561778965eb8caba07ed32d5a683dd4acc8731e56525c1931363a3451c23.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\system32\wbem\wmic.exe
      "C:\dlbd\k\kfs\..\..\..\Windows\o\ll\..\..\system32\p\tg\..\..\wbem\c\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:268
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1524-54-0x0000000075D51000-0x0000000075D53000-memory.dmp

    Filesize

    8KB