Resubmissions

21-06-2022 11:45

220621-nwv1rsfeg2 10

01-06-2022 14:14

220601-rjzpzacfhn 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 11:45

General

  • Target

    z7w3x.exe

  • Size

    621KB

  • MD5

    753585e5e099b192cf8d7593dd5ef4bf

  • SHA1

    68c5d6b38c9dd9e9e1e888386025352811147028

  • SHA256

    e26b2ffb2ee711fc7b04d62911580560794ee4fa9b7fcfade65ee6ff2eed0274

  • SHA512

    de96554eaa3971672f05228d26fc6cbe98c8a5b31d35b21c92256c4dfee24ec81a708d601e0be4b80a0a365f620e4b0582f6fcc950f29df2ed6233c8314494ce

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Horse.txt

Ransom Note
::: Hello my dear friend ::: Unfortunately for you, a major IT security weakness left you open to attack, your files have been encrypted If you want to restore them,write to our skype - HORSEMAGYAR DECRYPTION Also you can write ICQ live chat which works 24/7 @HORSEMAGYAR Install ICQ software on your PC https://icq.com/windows/ or on your mobile phone search in Appstore / Google market ICQ Write to our ICQ @HORSEMAGYAR https://icq.im/HORSEMAGYAR If we not reply in 6 hours you can write to our mail but use it only if previous methods not working - horsemagyar@onionmail.org Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * We are always ready to cooperate and find the best way to solve your problem. * The faster you write, the more favorable the conditions will be for you. * Our company values its reputation. We give all guarantees of your files decryption,such as test decryption some of them We respect your time and waiting for respond from your side tell your MachineID: VFZISKNXTU and LaunchID: 865b452aec Sensitive data on your system was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more...
Emails

horsemagyar@onionmail.org

URLs

https://icq.com/windows/

https://icq.im/HORSEMAGYAR

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 14 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\z7w3x.exe
    "C:\Users\Admin\AppData\Local\Temp\z7w3x.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1684
    • C:\Windows\SysWOW64\net.exe
      net stop VSS & sc config VSS start= disabled
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop VSS & sc config VSS start= disabled
        3⤵
          PID:464
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin delete shadows /all /quiet
        2⤵
        • Interacts with shadow copies
        PID:924
      • C:\Windows\SysWOW64\sc.exe
        sc config VSS start= Demand & net start VSS
        2⤵
        • Launches sc.exe
        PID:1296
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic.exe SHADOWCOPY delete /nointeractive
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Delete Shadows /All /Quiet
        2⤵
        • Interacts with shadow copies
        PID:1248
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB
        2⤵
        • Interacts with shadow copies
        PID:1908
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded
        2⤵
        • Interacts with shadow copies
        PID:1548
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:960
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:648
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:808
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1128
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:624
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:884
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1656
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:924
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:580
      • C:\Windows\SysWOW64\vssadmin.exe
        vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded
        2⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:1188
      • C:\Windows\SysWOW64\icacls.exe
        icacls.exe "{A-Z}:" /grant {Username}:F /T /C /Q
        2⤵
        • Modifies file permissions
        PID:1184
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1140
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\z7w3x.exe" >> NUL
        2⤵
        • Deletes itself
        PID:1288
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          3⤵
          • Delays execution with timeout.exe
          PID:1516
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1824
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1568
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:868
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\ResetMeasure.potx.[865b452aec].[spanielearslook].likeoldboobs
        1⤵
        • Modifies registry class
        PID:700
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\WaitUninstall.wmf.[865b452aec].[spanielearslook].likeoldboobs
        1⤵
        • Modifies registry class
        PID:1140
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\WaitUninstall.wmf.[865b452aec].[spanielearslook].likeoldboobs
          2⤵
          • Opens file in notepad (likely ransom note)
          PID:1332

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      File Deletion

      2
      T1107

      File Permissions Modification

      1
      T1222

      Modify Registry

      3
      T1112

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      2
      T1082

      Impact

      Inhibit System Recovery

      2
      T1490

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Desktop\WaitUninstall.wmf.[865b452aec].[spanielearslook].likeoldboobs
        Filesize

        235KB

        MD5

        6d2dfdbbe90fd20ea83a74b1e1301604

        SHA1

        4d0319a44dbdf926aeddd083942a61db4311afa9

        SHA256

        974e02f8bd593fd1f9f840d55b12fc86bb4b3dce1ec4bf91d19bc87c0ab309da

        SHA512

        43e85378881e86a86ddd25999f6d76e48f14a3b7d013190d9dd05b2813e2724a2476ce7ad86b873afbd7abb72a2319e8dd6ade64b26cc09b3c0d087534518451

      • \??\PIPE\srvsvc
        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • memory/464-56-0x0000000000000000-mapping.dmp
      • memory/580-71-0x0000000000000000-mapping.dmp
      • memory/624-67-0x0000000000000000-mapping.dmp
      • memory/648-64-0x0000000000000000-mapping.dmp
      • memory/808-65-0x0000000000000000-mapping.dmp
      • memory/868-87-0x000007FEFBC21000-0x000007FEFBC23000-memory.dmp
        Filesize

        8KB

      • memory/868-86-0x0000000000000000-mapping.dmp
      • memory/884-68-0x0000000000000000-mapping.dmp
      • memory/924-59-0x0000000000000000-mapping.dmp
      • memory/924-70-0x0000000000000000-mapping.dmp
      • memory/960-63-0x0000000000000000-mapping.dmp
      • memory/996-55-0x0000000000000000-mapping.dmp
      • memory/1128-66-0x0000000000000000-mapping.dmp
      • memory/1140-76-0x0000000073C40000-0x00000000741EB000-memory.dmp
        Filesize

        5.7MB

      • memory/1140-77-0x0000000073C40000-0x00000000741EB000-memory.dmp
        Filesize

        5.7MB

      • memory/1140-74-0x0000000000000000-mapping.dmp
      • memory/1184-73-0x0000000000000000-mapping.dmp
      • memory/1188-72-0x0000000000000000-mapping.dmp
      • memory/1248-60-0x0000000000000000-mapping.dmp
      • memory/1288-78-0x0000000000000000-mapping.dmp
      • memory/1296-57-0x0000000000000000-mapping.dmp
      • memory/1332-92-0x0000000000000000-mapping.dmp
      • memory/1516-79-0x0000000000000000-mapping.dmp
      • memory/1548-62-0x0000000000000000-mapping.dmp
      • memory/1568-84-0x000000007122D000-0x0000000071238000-memory.dmp
        Filesize

        44KB

      • memory/1568-82-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1568-85-0x000000007122D000-0x0000000071238000-memory.dmp
        Filesize

        44KB

      • memory/1568-81-0x0000000070241000-0x0000000070243000-memory.dmp
        Filesize

        8KB

      • memory/1568-88-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1568-80-0x00000000727C1000-0x00000000727C4000-memory.dmp
        Filesize

        12KB

      • memory/1656-69-0x0000000000000000-mapping.dmp
      • memory/1684-54-0x00000000756E1000-0x00000000756E3000-memory.dmp
        Filesize

        8KB

      • memory/1700-58-0x0000000000000000-mapping.dmp
      • memory/1908-61-0x0000000000000000-mapping.dmp