Analysis

  • max time kernel
    166s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 22:54

General

  • Target

    71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe

  • Size

    486KB

  • MD5

    a66202a5f7e693196a03ebb371ab5c5f

  • SHA1

    1d55ed4048f1ab5fc485776081526e758297e214

  • SHA256

    71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5

  • SHA512

    946a34003e65eafb866db270d90477bfa0828e230e42b7a998d11bddce21ca72fe31f23add3c714c4dcbb2c6c7e55df7328f662529819d3874e8973e78d4a5cf

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe
    "C:\Users\Admin\AppData\Local\Temp\71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Windows\system32\wbem\wmic.exe
      "C:\r\emqb\hfrmm\..\..\..\Windows\wirtq\ch\..\..\system32\krpy\..\wbem\k\bpeb\ev\..\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:320
    • C:\Windows\system32\wbem\wmic.exe
      "C:\qeir\..\Windows\nfy\..\system32\blixx\moa\..\..\wbem\igt\aani\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-54-0x0000000075341000-0x0000000075343000-memory.dmp

    Filesize

    8KB