Analysis

  • max time kernel
    170s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 22:57

General

  • Target

    5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0.exe

  • Size

    389KB

  • MD5

    1ca55a6f4216df3c48a88eb735f876f7

  • SHA1

    0b0f716e05b3af02bd61b2dc3d1b67ed3529298d

  • SHA256

    5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0

  • SHA512

    c5d8e76b8952a88d7fe95084d6e2dece889dcb7100ee0ce9e596854d265697ae2c5e4c357dee9b6444a651508d93d6053b645de107475a3548605566330351a3

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>[email protected]</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0.exe
    "C:\Users\Admin\AppData\Local\Temp\5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\system32\wbem\wmic.exe
      "C:\svcm\bwhd\..\..\Windows\gu\n\..\..\system32\uendf\y\b\..\..\..\wbem\o\ab\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:756
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1548-55-0x0000000075AB1000-0x0000000075AB3000-memory.dmp

    Filesize

    8KB