Analysis

  • max time kernel
    159s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    17/02/2022, 18:04

General

  • Target

    sample.exe

  • Size

    30KB

  • MD5

    2222479d681f7a554976a9797f315fd2

  • SHA1

    d535dfc613ab1081dcf0bb9dd92c0f533fa3a6b5

  • SHA256

    af24612700c0105cf990148b19e5140314a55701c7022ccd2811e8ee29d68d74

  • SHA512

    5dbf583e232d662cebbc191e7e9b2c73bfd04e0c455f599b88c5428354f777ea4cf47b8a06551b34519912861d05d78c4b2e2159a6e330749a943c7476925fc4

Score
10/10

Malware Config

Extracted

Path

C:\restore-files.txt

Ransom Note
╔════════════════╗ ═╣ What happened? ╠═ ╚════════════════╝ All of your important files have been encrypted and all sensitive data was stolen. The only way to restore your files and keep your data from going public is to contact us. After a payment has been made you will be given access to decryption software. As a quarantee we will decrypt 3 files for free. If you don't contact us within 72 hours the price will be doubled. ╔══════════════╗ ═╣ Instructions ╠═ ╚══════════════╝ - Download qTOX messanger from https://qtox.github.io/ - Send message to this Tox ID: 3728E933284CE638D06FCF1CBE921096E102508BD370D6D23137D3271EE5733825F63F56805E Your message should contain your Unique Key: 53566134903697098455
URLs

https://qtox.github.io/

Signatures

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Modifies extensions of user files
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\sample.exe
      "C:\Users\Admin\AppData\Local\Temp\sample.exe" 1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1396
    • C:\Users\Admin\AppData\Local\Temp\sample.exe
      "C:\Users\Admin\AppData\Local\Temp\sample.exe" 0
      2⤵
        PID:1648
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:856

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/780-55-0x000007FEF5783000-0x000007FEF5784000-memory.dmp

      Filesize

      4KB

    • memory/780-56-0x0000000000A60000-0x0000000000A6E000-memory.dmp

      Filesize

      56KB

    • memory/780-60-0x000000001A850000-0x000000001A852000-memory.dmp

      Filesize

      8KB

    • memory/1396-57-0x000007FEF5783000-0x000007FEF5784000-memory.dmp

      Filesize

      4KB

    • memory/1396-59-0x000000001B180000-0x000000001B182000-memory.dmp

      Filesize

      8KB

    • memory/1648-58-0x000007FEF5783000-0x000007FEF5784000-memory.dmp

      Filesize

      4KB