Analysis

  • max time kernel
    159s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 23:00

General

  • Target

    4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe

  • Size

    513KB

  • MD5

    26328ef6a8d0476111b18a14fb84227b

  • SHA1

    0386e019f5d1b581f75ba8a91dd204a0ffb7c8e1

  • SHA256

    4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c

  • SHA512

    c74660fff3e5e82fba0bc57955f0a68f350eec7aebb40a0322ea81818ee61859a20cf47e94a35d531b98b83cca852a45e5e9ecc2ffce531b14c145f88432d97f

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000080; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <span class="left" style="font-size: 14px; font-weight: bold">CODE: <br>------ <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 <br>00000&nbsp;00000 </span> </td> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><s>0010 SYSTEM FAILURE 0010</s></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> <br> </div> <div style="text-align: center; font-size: 18px;"> <p>The only way to decrypt your files, is to buy the private key from us.</p> <p>You can decrypt one of your files for free, as a proof that we have the method to decrypt the rest of your data.</p> <p>In order to receive the private key contact us via email: <br> <b>yourrealdecrypt@airmail.cc</b> </p> <p>Remember to hurry up, as your email address may not be avaliable for very long.<br>Buying the key immediatly will guarantee that 100% of your files will be restored.</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <br> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"><span class="right" style="font-size: 14px; font-weight: bold">IMMINENT SHUTDOWN:<br>------<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00<br>00000&nbsp;00000&nbsp;0&nbsp;00</span></td></tr></table></body></html>
Emails

<b>yourrealdecrypt@airmail.cc</b>

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 16 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\system32\wbem\wmic.exe
      "C:\vdbk\u\..\..\Windows\srvoa\ej\p\..\..\..\system32\vagx\hlvhj\..\..\wbem\x\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1540
    • C:\Windows\system32\wbem\wmic.exe
      "C:\cjo\apg\..\..\Windows\wsxnw\..\system32\nsl\fgs\..\..\wbem\ll\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:220
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:336

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1720-54-0x0000000076151000-0x0000000076153000-memory.dmp
    Filesize

    8KB