Analysis

  • max time kernel
    98s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    06-03-2022 06:17

General

  • Target

    7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe

  • Size

    211KB

  • MD5

    6e789d89c3817997e791a62a91a392dd

  • SHA1

    b88feefd90de401dabf9f1574fb2b47de608b010

  • SHA256

    7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16

  • SHA512

    ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: [email protected] Reserved email: [email protected] Your personal ID: 354-97A-B1F Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Executes dropped EXE 2 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe
    "C:\Users\Admin\AppData\Local\Temp\7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 0
        3⤵
        • Executes dropped EXE
        • Modifies extensions of user files
        • Drops file in Program Files directory
        PID:4840
      • C:\Windows\SysWOW64\notepad.exe
        notepad.exe
        3⤵
          PID:3020

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    3
    T1082

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
      MD5

      6e789d89c3817997e791a62a91a392dd

      SHA1

      b88feefd90de401dabf9f1574fb2b47de608b010

      SHA256

      7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16

      SHA512

      ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
      MD5

      6e789d89c3817997e791a62a91a392dd

      SHA1

      b88feefd90de401dabf9f1574fb2b47de608b010

      SHA256

      7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16

      SHA512

      ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe
      MD5

      6e789d89c3817997e791a62a91a392dd

      SHA1

      b88feefd90de401dabf9f1574fb2b47de608b010

      SHA256

      7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16

      SHA512

      ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c

    • C:\Users\Admin\Desktop\AssertRead.ppt.354-97A-B1F
      MD5

      95fd08e70234921d1e5c36f2e41a793c

      SHA1

      e2f0533f4314f424a786f159334cb3e3027122b4

      SHA256

      4d617096e879ab73f830503b3d585998f017ee0b7dd6c8f2a2a0b4818da6bbbb

      SHA512

      36f7f22b9fbb105f5c5be2131b3879fb3cb7b7b785b0570da7208eab89e26b689a4292d0d02f2e0209932fb6d64568e4365328e3ed354de399e57028aa353f9b

    • C:\Users\Admin\Desktop\BlockNew.png.354-97A-B1F
      MD5

      06f9e2fff85adde5f80ceac3bca56677

      SHA1

      116fb822a5b7afbbe9982b52e4e5b75d6a39fe3b

      SHA256

      4c8c8cf2f3fdbc03710abdc5c828863b88417e01ad5ee4d8be6fe536dff1a6b3

      SHA512

      ecc57dbe4600ea544307fc83dd9bfbe2c3efa472e5b40fcdb08e33fc677853bce10c1331e3b1acb6bc32317bdefcedf1ffc813e69f1226a6e2b8b9d1a9e1e181

    • C:\Users\Admin\Desktop\ConfirmDebug.mpa.354-97A-B1F
      MD5

      7a78aa549848ad04ce6421af452f64d9

      SHA1

      5f0a24fd985e70fce92956d083c841c3602978fb

      SHA256

      cc36409977106bb5cd40bd996746db8b475cbb6e6adeedbeb38225024bb9b5c1

      SHA512

      04227e55860204d44964e5e6385c36b26340791d19a9d6368d0d74bf37c728ace663115298308551573630d040370aa715d75466876d9982f54eb3a6a18a6c63

    • C:\Users\Admin\Desktop\DenySkip.3gp.354-97A-B1F
      MD5

      9bf7ff46c9f53ee668c81dacba37da24

      SHA1

      badc064ec237fb83c49c97a18a33d8c25be24210

      SHA256

      3fa42474a47695241e92359fadac47649c9f133e700d20b97ece5404f0d5a516

      SHA512

      770722b2abae597c489f754261cfc9e499a5cccecbd49f59e11a2a98d873986ae5b27b3c2a35206e16cfaa916a22a9e18d24b11e75b4bdb81a393d274a19af77

    • C:\Users\Admin\Desktop\DisconnectRepair.pdf.354-97A-B1F
      MD5

      a74f5fe9be23ba61457a2cf1008ddb16

      SHA1

      6cd25db61376f30b791ac6ac5be190905093a2a6

      SHA256

      b4162b4ca5413311d9a8243568c30b495d0146df196a48267fcc19bd4bae72b1

      SHA512

      b1f89c4c75f57a5efb2a661b185121081201f4820b642a4bba69995a5af951015dd0edbdf24e504c3a5f21af65918aa0d8e3b70f8f81ae7a396e8923a4da072e

    • C:\Users\Admin\Desktop\DisconnectUnblock.temp.354-97A-B1F
      MD5

      ad0cef7a74541750eaaa8f9ca207601f

      SHA1

      a0bc6d4446de6db78c3be7905225de5e5ef630e8

      SHA256

      dc2e52284d721c79413d6437468b5e2f0422bb3ddd9ad0abfd303ee383c1b032

      SHA512

      cddf591d1321ae3d5c1efa3de9fd1b4d9879a90a056b33711ef0d4118a22536f66473d8e1196582c4f6b02b0ea5e80c0ee58e7b6c2c56b04560914568b05d462

    • C:\Users\Admin\Desktop\ExpandWrite.mov.354-97A-B1F
      MD5

      1a9470852798a9337be6a40107c8ec96

      SHA1

      16bef019e2bc905a86a4341d9ed5677305c1bc81

      SHA256

      79a299b3600f61d43fa2fe7bef3034682b48d4f2f3b1095c0e3c3f6f6008a693

      SHA512

      e955f67faf8bf7322767df1f7d756977f66c2fb2f8f503f927e5be1aabbe02810ca7342f66221e3f8757f3029b65dad4a7acdf584bf1df45cd27f1b19875e5df

    • C:\Users\Admin\Desktop\ExportSuspend.ogg.354-97A-B1F
      MD5

      0b922fcaf9926cba307a99de39cd64a0

      SHA1

      8f576d342f4957a3ef113d03c59eb7aaac1c43f2

      SHA256

      2e4f43a6fb23615fb9490bc31dcd9239e1f353c7a71a92f975c31e2dbdd09953

      SHA512

      6f65dfff45c251aec0a632fb4a512b97ecc5114ad92449ade381cf1aebdfe92699817ad227e2e3f0013eb33490bda0a73fc479a6204e55674b82e619a5329f75

    • C:\Users\Admin\Desktop\InitializeStop.ram.354-97A-B1F
      MD5

      f257d8dff28a634a6ee604baebec0015

      SHA1

      e311b815e83a430130eac26f3f1ebeeb6f5c488a

      SHA256

      71212c9c188d7af35b7212b3bbb9629626135d52c634aa5fa5de65be90747467

      SHA512

      1f19df0cfc376b77890b2220d353daebe420566b1c1e2d4d43c8f3bc9386d136552b0010dbb30c780c923bd4ab7394be97cf532d7c99c9d0aca6a12ae6f7f945

    • C:\Users\Admin\Desktop\LockSend.cab.354-97A-B1F
      MD5

      3d7b092260ffc76809a9c6388931cf8b

      SHA1

      52412e73325d4d55297775c7372b8f3b5d9fbbe5

      SHA256

      b972758d644238c5a734d990b6430ea69100899f1aaa8f823fffc90a1f346dd8

      SHA512

      05bfdabc919a53475e9ec193e979a2b657a8fe5a56f85349ce2033efeebd324e757b9adc2d496ff4f85e0a1236267efe80c76427323bd7783652f1ab274d86bc

    • C:\Users\Admin\Desktop\LockWait.pptm.354-97A-B1F
      MD5

      860bcb1a1b862266c3a788409093a6bd

      SHA1

      407cdf2b6a6b5e1dbb3681eeec14dc1d7e501bff

      SHA256

      ae9c22b7bef2c8c4329137702b04e4159ba3adc85f9978ba3547ade23ff5cb80

      SHA512

      d8118c92066c989d80e9930f8451305d7be6c1464c3a66ba718a4c02696028a638c383386313971207fcbcf8b0d8b2c83b39dc46847320686ca65daaa5a57345

    • C:\Users\Admin\Desktop\OptimizeRequest.ini.354-97A-B1F
      MD5

      93fbbd6880cab85ea25d4a254701eed1

      SHA1

      30882546efcb67f2c1aaa7aa7ae9e26b3fa1a7f6

      SHA256

      44c339f11a6cbf88b29e8dbf85f04941325269b8adb7e975b068c1be2b1bffe1

      SHA512

      54b8bed2138eee6bdfa6f3baf65f3e7becb2b38368aaf1c6600e0a904e258f99c58aca7a66d3b6d8ae6cdd2d1db68193e16f2749d7ea85c332d51b1de76dd150

    • C:\Users\Admin\Desktop\PopMount.ex_.354-97A-B1F
      MD5

      b22ca760d3bd9a196dbdef5fda58a9b1

      SHA1

      63eec36e77957d617be1912917b6e2cd8a3d2987

      SHA256

      f5e781b4895d09c8e9c57fc0d361b2adb2b81a5aa1fd83379f2fe122c75860c3

      SHA512

      4163a36ca28c3cabfdfb825b916c77fa0736f4202a72c0097de953802c55a4735b8d63e086fac2a4ee2b090df559cc7a47e070cd645c1bede2941c9c1574342f

    • C:\Users\Admin\Desktop\ReceiveResume.mp2v.354-97A-B1F
      MD5

      ed6a7b3aa98217cd70f59b84f0d7aa28

      SHA1

      95887b4ad385905e96d6d0d20a4be769e596af68

      SHA256

      64f429c7a4da00a4a4bdfd2e654d3a184f9bb236f99de74b5d488e25c0146abc

      SHA512

      630ab83924e342cbb6b6ca3f76a4f8ac56bd4bd28f56b6799c1193a0808cb7b54dc8968e8051a4a75fdcd7e2a0544a0c9b0b5b156bfe16637ca08eb519d90ba2

    • C:\Users\Admin\Desktop\RedoConnect.aiff.354-97A-B1F
      MD5

      a7addd38d111ee796c21608457496f73

      SHA1

      ceca118938516c1b8146c9be84dfa15c20588fef

      SHA256

      08b654e2927a907847df54f16ab40a83142ae19fc7724710e132c915b074104c

      SHA512

      f9b1d4e63c63cb1793283f4bf46b713fd3d4483dd46c323cca4b4e5e4150e6484ae87af8a19d765004f7d949197f83fde23a5a1f75deec24ccf3e7bf3e06f640

    • C:\Users\Admin\Desktop\RestartAdd.cr2.354-97A-B1F
      MD5

      00c06e34e7e97ec541ff850f527ae1a8

      SHA1

      12ffb05c66920a8262400c69957b652cd2723f1b

      SHA256

      87459a7345b350557f3b2ebb96e0f131eb801e7a89deedb2e01d2d05d56f0ac9

      SHA512

      8b2109860cbf7d5aee33c3d9c2e43ad7bf9e5bba1edc3b9b5e869ebaa985832176b9387858627ae17c9a829e05169bf73658876db6c99ed0b9b1b5e8c8b0b6e8

    • C:\Users\Admin\Desktop\RestartSwitch.emz.354-97A-B1F
      MD5

      ce86580d4933e7fe6ef83891b50d3c01

      SHA1

      03943e5fdff3ee9472469f7b14c27b4e1fd7d11f

      SHA256

      2ad263c230dab286d5164b9ea9b2b917ea26bef7cf2d07d1cca8defd70b5c48a

      SHA512

      ac582dc0d4ce5629ccdc69ca9b2bca7f727371559aafadbe3065c91d5e83578e6c62389bed2ec010e143303983509633ede38e9499cfc244ce491cdf8ee71702

    • C:\Users\Admin\Desktop\RevokePop.vbs.354-97A-B1F
      MD5

      fac51abe7f4f05a99e57e480878b1a6f

      SHA1

      6e3d551a76be43fe07c79f43ab7cfe0139c75226

      SHA256

      014102429ecf6b6fa8c099dffccce172045b805187c9845c4937289d28ca4564

      SHA512

      7644e1f2ff978927e2e247e6e02956669c1684ed24214444ad2aaec87aba26fc7222337f8acfe4a118aaf5a150db9fde19bec1227292d40c15d3a5203b733fa5

    • C:\Users\Admin\Desktop\SaveFormat.midi.354-97A-B1F
      MD5

      b22773ae7704683354acb8eb2db498a4

      SHA1

      46f45d085b254f79b8f63976c064cdaf91ef0c08

      SHA256

      7436d4d8a5a7bad79eb5ef32bd7b7f8ec47ca6a89b6c36c8ba5a0dfc7052cda9

      SHA512

      4bd8902b48819c0647896e772db69e8ce07e7be371878176642dde809af5679aceab8540b3bd50cbbf5ed676c98cc2e9685a63b5bcf36e29a3f369514c0d818e

    • C:\Users\Admin\Desktop\SkipWait.bmp.354-97A-B1F
      MD5

      71b0272740c76a86767df211b9506856

      SHA1

      83437a450d61271d88e5396ae4f1ee570b083a6d

      SHA256

      4f672fc7a1e0f954adb4dfb2ce91c2048ded45921adbc5cf2c0e7996d4690c9b

      SHA512

      73ea9e362abda589116fd917e09c4281c74ba5255b78d49e3821e68b56eb86c3f4be6c457f022405869a9b6571c52436120dcce291b62e2d9acb6b49be312238

    • C:\Users\Admin\Desktop\StartBlock.avi.354-97A-B1F
      MD5

      9b8e4bf6785b7b4b8acd4259ff1ef0f7

      SHA1

      bd18e44e7c90bf49a76589f0b79f0b24aefe78d2

      SHA256

      9b5beea45f773db15344bb15bef94a236295291b6e165aa215637e7d4d807314

      SHA512

      9cda75be39134eff5f477a0ac59aca397d903fbe0ad0c166d82a826bbefccf62f92029063a8ed9d6e98ef096b94dfb3af735405a17bd0f888b3d72932c030238

    • C:\Users\Admin\Desktop\SyncUnlock.TTS.354-97A-B1F
      MD5

      cf71cc9ac2ae80894654d938a620df14

      SHA1

      1da149cd5d0686523a862e15684dc0ae47de8526

      SHA256

      ec8fa171432193fcfb6784fe5c6b2b7e6ad87197f5e044db50de2c23386e6e5b

      SHA512

      b944f5cba8b83d01d8e78a9a0a240d7d013a6c343f8ab8d5e348d2f0fb2148d33d1f0d17565d725856ce5e69e68daf0a5bcc7234f50fcbfc80776037657beec8

    • C:\Users\Admin\Desktop\TestApprove.vdw.354-97A-B1F
      MD5

      d5426c31d973acd1b8013559d89c3be1

      SHA1

      6cc8da870c8315ffcda75f7f67b25bc95ee5b01e

      SHA256

      8241762c6084b8a376cc83990c0d207b1608aca12dbcab4c3304850b82c55057

      SHA512

      eb4c5a330b8a4f1ec7b0e27448baf63ca66b6087165f8392594a3cf2cced74ece30dddbcce3c06f98f975fd18e655e0a3baa5a58e642971d261eafbd7f47605d

    • C:\Users\Admin\Desktop\WaitDisconnect.kix.354-97A-B1F
      MD5

      1e088edc72bba436a6948e370532f487

      SHA1

      3e2957f2e441539eb4bf1df9fcc888d1601302e1

      SHA256

      a2aa77d64adb0536953ec5d3b11d0c436f4534dd71c97c72931544c77519a65b

      SHA512

      ad17765c7e084251e53996f4ad00f58091dd71e153e543cdcbeb7c143822e0689c522f02299bc1ec5e2f5fbb65f6dae5c2e71e45ee6e5aa6b01e19aa5c2bbfe2

    • C:\Users\Admin\Desktop\WatchInitialize.easmx.354-97A-B1F
      MD5

      06009bf99eb178593fb575a19468d76c

      SHA1

      cba1530e5d8c7948e1ef5cfbe1c6c28b62bb5aeb

      SHA256

      f159a8085137fa915488524cab7a135750109cd183bec434017ae8894e9caacb

      SHA512

      258c949a99387676dbd8ede003fde90616befca9c0270f679a6ca5586e21925b5f6684723be1828e4ed90930e3240f860695858fef88fefc0f0e969eb5900e78

    • memory/3020-158-0x0000000000640000-0x0000000000641000-memory.dmp
      Filesize

      4KB