Analysis

  • max time kernel
    161s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 22:57

General

  • Target

    5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421.exe

  • Size

    353KB

  • MD5

    6ad5be8822fe02aafdf6e18c04c570e3

  • SHA1

    be1217e1bd516570fdb13519650d06bf34d57ed7

  • SHA256

    5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421

  • SHA512

    87dc92b2ad52d4caee90f2c39583ba0a2645957495f9e6d0d3d1e828e7a22ea7ed280bb6fb8551ae4033ac6f6f8837233a86990d34348afbd7ef3bb8404de95e

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">vZZAUN34elt866rSFxgV5SgwMjlH2TL4t+Qnnh0DuRWtu0FzJxFilNprR3HsgICuvYZWXthFWRuaTSu5GB9R967VvSbbPHLuXL/WJRZSX/cEDJtsjhYUzmatElZT+L+340hpuiFmT7F2mB/UPgvIR6uYCeEweYPVQRKkDLIZOIv8g0H5G56Rlkdah9pG2TDujzTX+nSkbcT9jjjEgxk4wOM4YePVk1lD2WyNexemAY69wvEqtrrQcXgXEYyv1pyN/2oh0SNeMI8RmIGgVV6YKsxa1i7am3i/JEsFtm3DX3IsY0FSWvtaxjCJ8Kk8OAFoQcS+5hlOF8Kylt3I1SX17/hzqIig+gO3lZGjlKgVsJKt2hnUum+qbcLcGvBZ7/1RhB3JHWkM7KZ5/tnncreufle0dwkXRpSKbEzoeHv69l38yGfOYLUL5nipFptprbYEnAYuhlRH6jHouRbBGqPEOekFcQbGAEdpNaDJwyNAaDDzNCKb9a/IpBE2Eje2jRfbbZ9xm4m/gZmRyWeRMTBYGg9irPez6A4lC+8lPN9PKzutkxYsA+GfSko4gm/7t4pToiLMXejw5mueGLO8yvxka/AlFU/zJkTI807Ksl/LoW23sbwP2HHbvK9Id/tuigHmhME7GQc6YIm3xD4mpnlFol9Uvkfn4zEUNzVcsRkoHchL0ZXRbXXhs9tCih5PDi1oM3qbJ9whmer4OQ3dRvO6HOkcPqwqO56Pb6FkjoMWEV5bsCOknOabAOY2GT3MHGw6YLJIrSK/69yqmqA+JU4ThHk2/wZ2yLAQyZK+SoLQ0Z6o1DBgjG3KGMdVOc+OpV0dSYA00W4Kbalfbw912/i/Y3xIax7t0QU0WU1/kc+zj7vdp/mO4WEdFWDrJwgOhfRGkItHwBLPTjusKezIqRhz8yU8HJKMVC4KFDSg77rSvkcfm0AMIh0It0JW1adfmIjXwLz6/fVKoxAWTCr62f8fYvqx3Hw/i+zI7RtgyDkSW3bV8UJRKBt2wcqe/U+ABf2nljv33sZAk2cJZ0iECjTFYM4+cFUs5Mb4XGHQe0mEjdY/v8pHloE+BdfGL13Flnk9tsN6xfztpGyH4QZiu/HVzi1vjbeK27x/szbbQaG+LXfM2jHTCkvhMYPiaJ9FWPHRRJS+FrJLYmx4yNsRvaCWUlAyQ5954+YOO+Dk2mtX/H0k4wm1EVx66LpK4tzmncMU9Ktcvkgs1JJ3C2H/n5Sm0/nzFt4cAYJtUjKoqI22MDALvhoSbEw8/u+vlV82prZU+Pxo/oKHnQLmzM61VLTtWi1gMUsLv3WzlQ+f5fXBOieW+rumGZewCSXPNWanDuqlRLf4AfNYAKKXy05vIYk+ofrIS509vHfMPM/ssPQVJMgLClau88yA7hQl0YPiELWQrNYbWZDfT7XFytjjIH7MWFPo/wjzqD4aj5IEOE/FECzJZpOGkZf4Pvcc2jZNpxKAJSFjieuUL8UHCcy08oH9wgCL+h5qzqSy7d3k+ysE4ZSgmHUqChTqbEPbiTQgFvYZtCaQNLUv0LedeLiAsejiMO51j0qqw+7RcSetWEV5GUfEVi6D3weXkM0RuLBM+I3J9xEkYJ72w6/1J2vuaCFUh+wWR9+p5iAE0xoW2cffaPhTlBnSX/SUabmMd/tIja1FOxNXjI0rS62SUb106GuDdGrinA0Rgxv+3JNnQg+oYCd9rsOvOLBfj5b0DG2qtLB/DeihvhUeI+4BmPeNugKvOShGn3OIIOtEBpHeVs233iHRbVdX1O991yb+MCn8dn9tPtQInxEL/Q/3/FmozYPtWis+hNsYgQoYydRBKaLCbmrYe69+k2dce/drbvvgA2BJiLp5gxkC/hfwlJTsk9PT3VQWpsU2C1tt+RKoGLfqyURvTBQEhgJ8ZYkho1DByhiCNhUf44432CrYe862Jw1JDmy2sJzJLNUbGChAusHJQxPLZfzNi2nJX9Z+Vi4Dyj7oeiiZU5d5YJir1LMoKnS8mXSmgX5jpgAxXHhvZC8oIf9QTcgMcXqSU0ffItmOmGNGpXMZSoTRpL2Mtok8m4KHBW5en4uKjd6zqWUZnbjGj3nEv0WRlpdgh+V6kFOJWMJwutulonD1xmJZe78a0M4B8bTa0tS3CHxQBSCftIgOHbgIsPyGQDnBfJeW55N5XKA4bR7bt+CJDK97V6RYEtrbyibueMo5CvVI0iDBx+vhwp7M+i+UvZwG9ltflJV+FvSbsikhAwoiOAA5ADIAZQAwADkAOQBjADQAZABhAGQAZAA0ADUAMQAAABCAYBoMQQBkAG0AaQBuAAAAIhJWAFEAVgBWAE8AQQBKAEsAAAAqDG4AbwBuAGUAfAAAADImVwBpAG4AZABvAHcAcwAgADcAIABVAGwAdABpAG0AYQB0AGUAAABCNnwAQwBfAEYAXwAyADAANAA4ADMALwAyADYAMQA4ADQAMQB8AEQAXwBVAF8AMAAvADAAfAAAAEgAUEBYiQhgiQhoiQhwid/Ye3gDgAECigEDMS4w<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421.exe
    "C:\Users\Admin\AppData\Local\Temp\5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Windows\system32\wbem\wmic.exe
      "C:\dh\..\Windows\xm\..\system32\obwa\rihw\..\..\wbem\rydx\vxoqw\xv\..\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:688
    • C:\Windows\system32\wbem\wmic.exe
      "C:\v\..\Windows\xvtji\ldx\lm\..\..\..\system32\rfdno\..\wbem\d\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1632
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:976
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:584
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x460
      1⤵
        PID:1468

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1608-54-0x0000000076C61000-0x0000000076C63000-memory.dmp

        Filesize

        8KB