Analysis

  • max time kernel
    169s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    16-02-2022 22:54

General

  • Target

    6c77e797c81efeff08f12832a0719e699ed519f483accdb5cd326fcdd8372fef.exe

  • Size

    391KB

  • MD5

    cc16cd85bb304f6d9bf2c0ec9fadde6f

  • SHA1

    9fbe41c0b6168b25b0e0ca21814af8166cc35970

  • SHA256

    6c77e797c81efeff08f12832a0719e699ed519f483accdb5cd326fcdd8372fef

  • SHA512

    f073ce948d58ff07c5107935651930d6e945f3b987c2da41aa6c733958d23a0b6b2eab655fcab116aa467cd9453349653916fa70bffdf7662d65f985a5434ff5

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">emBzzq3/EWSIaeLGLvPkjz5gx33GiaEQ22ufczQOJMne2XjMKunvd24y6e31sZ6rIrbhamTMAy//e/4sWmRwK/T7X2Iq5KYFpi9HgS9IyIJVJHBIDXLMRH1qH2SLcSCr21aTni2auLZafjbnZdemnnymPdyLbnUIZirPOF6d4DKYkfQPgHlI37N3pVZ4GA3FNNtKWxP0NdPFNsadESzgKmPt3gALQpxpv46D5y8NO+p6EPbyUeS0cYNF+4uicu3SBOD7wz6LGxd/5uKhf8PxFUIgzi21YdS8YNGxtQ08bHmy+92odfu+d20IrlBrYH7tdeg8oteveZd+HOkguwGwpSVVopGQwOGCocMEqvNrM+UfTwhfRJ0wCiQ6kQbSUiH60G1NEtEaGAPf4dxKWAkE2rzS0ApgaJfmq47szRJSL7KD1yIY8sQwE+oIvlsI/191F90T2zwyz+5W42Y/Ayp1CpUCjSa+j6qpIfwhoenlIBgCpt5evX8uUcrylNI2UwteVCxqEgZ8G+Y9X5hPSzGZAvR2cfnlrhSM/REICzXu6jOolX5Cl58m/pMXHbcxisPDVrYcZssehCF6MpagVd1PW6szwq/7lK7+o6ceyKbtYlG2WoL9fQaSpZ1YYnS6e9IeIDwGnt38ZK9dxHX45g2yZNOxCXE8xX868ZnvY4NjKW0i5BmDy4oDbn2lHQ7WZUXpr+K9tvTg1f5dsBCsKnrN/H/ZnyE3WgDIds7E5HhlMZbjK8lZJrBteAvQn+jOmVruO3pUc6ne01TN2W8s+/xpbdTeIjU7AH/WFx6nViThmnZwH5q89O4Qm8j7B+fzxEQaSjWyh6RY5ZIGxRBcxorpxF9aI7+3QvYo+sVvdYnSmG42ezMK4VDgWU/yND2XC8afmxKJ7U3PhojfCjkBMu7JIHe5DZvmw82mDJeo4pjOky8Qhn20JpUK6eLjE+TNYTqt46cAg1TeZ1sZt0uQAVEcjeh+rbRv/nclX0EoS13rxAJ6acMzKvwHbQccM8Hd/lfAD2DUmnfL0RsCrik9fe4nmuJt3G4ljkt1DvPF6rrrw2n4VCrQ9BuYScT2XsOnSAroRixlPk6Q4fdABdEt1ESwnkrJkzYx6PQ4DU5emN9PPhWwJKtYyciJlUHvq/usnH4kcikjqSTwBuqw15fd7YutUUAkSluNFNzshi4hbPxiTlDrDPKCjupNa/Lm9KCO3J1sVW2mk0lIeLUdSzgL0Vjh8bsAoCcAKfI9JlTorXSzaJVCILWHnPUDsRNPeFYSRvHP4yphs+lmDSlbQ9rcdFxCoEqk+cObahh8hhU7edeElJEKcTf9/p51Pek4eO6lhaIiisrcO9N24XlTxqVl9CuBzwPRqfTXCOExJQB0nZEqotpabbHPf8zu6czD6Tk7acVGxoAJmRMXFsVWgz8sfGVdavrULOG83IiYz428FzxFKutGRtSjJVJrN981JzaeLptBGtAklNswnhfK8gwxGzM4GtiTdJMevuV22t/zK+2diXTcy1X1gCl9hZqlPRDh+WomFiLvxXUSFLZetgZZkTUzQ7H6EK03HaTXmYFpL7eRe32KQEWsFmVbAHQh7jKdA0F76cwoumVXrILr7dl7u7FDEW9Nxaz43zjaTS675JaB7861duUsHgiZW52RRRK7flm8gdiXgLzXA8ny423+wmA1Qq//J6+hPzvVEBnYy0e3Icx3E4u4MC5W2uJoZ+U76Eahws1QBZTzRLL1yQh2XJqOFTcHeG82F4+1R+0CXdCuWh3G5LNo58Xi0hDKFaL1QesO3VlceYs98vHGxS3eEEDG18lzbPgfgpFZkiRCNLHVupTnqlQytCPoRffD7/IwiqB3ItfsysmztkhX1UxS/TbIyNOrlrHtZS6OQxqLRC+HTvcSQDG+FcLaeC9YugBjK5kHiia6cEX2A4yfSNZtNBzjjPDcQJNtvSaeOQyBSCj7xcCKsKdU8eTqeW//MdE7GFGxqdSQtbI4hs4OMbXeVD+B7WTPRDM5amPrifP0JKa1x4JxEiu/AZ5vHtxHlWLTq1UpOw2jWukE+ZT+6Fkwe4bAg95nz4iRdW/H9VQuiWR/GBMoOSj2ajGIem/Di2D4gDMc/V7EVrAg9pK2a8EI8Ee11e4jmttjSNpf1AYMOfNFGN6XF3IBnlsUUzLVCF2e2AwRye+r3LmqqbHTuMXSMMAdTPCS2OrZtjVdO7GuNg431AjTvR3TMS13+v/A5FZzrf8Wy5uzWgoiOAA4ADAAMgAwADkAOQBjADQAMABhADUAZgBkADIAYQAAABCAYBoMQQBkAG0AaQBuAAAAIhJKAEQAUQBQAFgATwBQAFIAAAAqDG4AbwBuAGUAfAAAADIsVwBpAG4AZABvAHcAcwAgADEAMAAgAEUAbgB0AGUAcgBwAHIAaQBzAGUAAABCNnwAQwBfAEYAXwAyADAANAA4ADAALwAyADYAMQA4ADQAMQB8AEQAXwBVAF8AMAAvADAAfAAAAEgAUEBYiQhgiQhoiQhwuam4DngDgAECigEDMS4w<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c77e797c81efeff08f12832a0719e699ed519f483accdb5cd326fcdd8372fef.exe
    "C:\Users\Admin\AppData\Local\Temp\6c77e797c81efeff08f12832a0719e699ed519f483accdb5cd326fcdd8372fef.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\system32\wbem\wmic.exe
      "C:\vpuu\oydoi\ya\..\..\..\Windows\gdi\s\gy\..\..\..\system32\trxt\..\wbem\cchit\bt\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3080
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4888
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4208-130-0x00000279A4F60000-0x00000279A4F70000-memory.dmp

    Filesize

    64KB

  • memory/4208-131-0x00000279A5520000-0x00000279A5530000-memory.dmp

    Filesize

    64KB

  • memory/4208-132-0x00000279A7BD0000-0x00000279A7BD4000-memory.dmp

    Filesize

    16KB