Analysis

  • max time kernel
    194s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    16-02-2022 22:57

General

  • Target

    5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0.exe

  • Size

    389KB

  • MD5

    1ca55a6f4216df3c48a88eb735f876f7

  • SHA1

    0b0f716e05b3af02bd61b2dc3d1b67ed3529298d

  • SHA256

    5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0

  • SHA512

    c5d8e76b8952a88d7fe95084d6e2dece889dcb7100ee0ce9e596854d265697ae2c5e4c357dee9b6444a651508d93d6053b645de107475a3548605566330351a3

Score
10/10

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>yourrealdecrypt@airmail.cc</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

<b>yourrealdecrypt@airmail.cc</b>

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops file in Windows directory 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0.exe
    "C:\Users\Admin\AppData\Local\Temp\5d0eb5bbd919e415e5cc944bcb774ff3bb9bcab8f428b128bd3f55a374d0cfe0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\system32\wbem\wmic.exe
      "C:\vbqvx\jqqv\..\..\Windows\c\qh\..\..\system32\i\..\wbem\wi\olry\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3336
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:3872
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:632
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3536
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2332

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads