Analysis

  • max time kernel
    163s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    16-02-2022 22:57

General

  • Target

    5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421.exe

  • Size

    353KB

  • MD5

    6ad5be8822fe02aafdf6e18c04c570e3

  • SHA1

    be1217e1bd516570fdb13519650d06bf34d57ed7

  • SHA256

    5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421

  • SHA512

    87dc92b2ad52d4caee90f2c39583ba0a2645957495f9e6d0d3d1e828e7a22ea7ed280bb6fb8551ae4033ac6f6f8837233a86990d34348afbd7ef3bb8404de95e

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>yourrealdecrypt@airmail.cc</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

<b>yourrealdecrypt@airmail.cc</b>

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421.exe
    "C:\Users\Admin\AppData\Local\Temp\5e8ee7af17b4ab3994b81309106ec93de0d059796a59c7f5ce3bcf325bd3c421.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Windows\system32\wbem\wmic.exe
      "C:\risu\cu\..\..\Windows\v\..\system32\kvj\..\wbem\in\hcwro\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3052
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4164

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads