Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 17:45

General

  • Target

    3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe

  • Size

    410KB

  • MD5

    80dc3c416941c3d8955fd132d29d2500

  • SHA1

    5800d69fbb28e74b7683bdfcc2d230095e44e996

  • SHA256

    3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a

  • SHA512

    ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247

Score
10/10

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\RECOVERnlxbd.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA4096:https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? It means that on a structural level your files have been transformed. You won't be able to use, read, see or work with them anymore. In other words they are useless, however, there is a possibility to restore them with our help. What exactly happened to your files? *** Two personal RSA4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key, which you received over the web. *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. What should you do next? There are several options for you to consider: 1. You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or 2. You can start getting BitCoins right now and get access to your data quite fast. In case you have valuable files, we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions, please access your personal homepage by choosing one of the few addresses down below: http://kkr4hbwdklf234bfl84uoqleflqwrfqwuelfh.brazabaya.com/39F1AA9E73F6D5A http://974gfbjhb23hbfkyfaby3byqlyuebvly5q254y.mendilobo.com/39F1AA9E73F6D5A http://a64gfdsjhb4htbiwaysbdvukyft5q.zobodine.at/39F1AA9E73F6D5A If you can't access your personal homepage or the addresses are not working, complete the following steps: 1. Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en 2. Install TOR Browser 3. Open TOR Browser 4. Insert the following link in the address bar: k7tlx3ghr3m4n2tu.onion/39F1AA9E73F6D5A 5. Follow the steps on your screen IMPORTANT INFORMATION Your personal homepages: http://kkr4hbwdklf234bfl84uoqleflqwrfqwuelfh.brazabaya.com/39F1AA9E73F6D5A http://974gfbjhb23hbfkyfaby3byqlyuebvly5q254y.mendilobo.com/39F1AA9E73F6D5A http://a64gfdsjhb4htbiwaysbdvukyft5q.zobodine.at/39F1AA9E73F6D5A Your personal page Tor-Browser k7tlx3ghr3m4n2tu.onion/39F1AA9E73F6D5A Your personal identification ID: 39F1AA9E73F6D5A
URLs

http://kkr4hbwdklf234bfl84uoqleflqwrfqwuelfh.brazabaya.com/39F1AA9E73F6D5A

http://974gfbjhb23hbfkyfaby3byqlyuebvly5q254y.mendilobo.com/39F1AA9E73F6D5A

http://a64gfdsjhb4htbiwaysbdvukyft5q.zobodine.at/39F1AA9E73F6D5A

http://k7tlx3ghr3m4n2tu.onion/39F1AA9E73F6D5A

Signatures

  • suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

    suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe
    "C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe
      "C:\Users\Admin\AppData\Local\Temp\3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\Documents\ayepmv.exe
        C:\Users\Admin\Documents\ayepmv.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Users\Admin\Documents\ayepmv.exe
          C:\Users\Admin\Documents\ayepmv.exe
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Drops file in Program Files directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4392
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet
            5⤵
            • Interacts with shadow copies
            PID:2380
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\eeexf.bat
            5⤵
              PID:4384
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\3921CB~1.EXE >> NUL
          3⤵
            PID:3896
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1704

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Documents\ayepmv.exe

        Filesize

        410KB

        MD5

        80dc3c416941c3d8955fd132d29d2500

        SHA1

        5800d69fbb28e74b7683bdfcc2d230095e44e996

        SHA256

        3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a

        SHA512

        ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247

      • C:\Users\Admin\Documents\ayepmv.exe

        Filesize

        410KB

        MD5

        80dc3c416941c3d8955fd132d29d2500

        SHA1

        5800d69fbb28e74b7683bdfcc2d230095e44e996

        SHA256

        3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a

        SHA512

        ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247

      • C:\Users\Admin\Documents\ayepmv.exe

        Filesize

        410KB

        MD5

        80dc3c416941c3d8955fd132d29d2500

        SHA1

        5800d69fbb28e74b7683bdfcc2d230095e44e996

        SHA256

        3921cb707f4e47deafff47d53d066217f4fe97546f7427ecb2c0fca1ce015a3a

        SHA512

        ac0434782766d7ff161818133c6a5d5f4819f03abd93fdd38b40aa3dcb2332a63ba88f09ff6245ceb28cc9517713df7072048e384bc7236b3fa8047a19252247

      • memory/1476-133-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/1476-144-0x0000000074890000-0x00000000748C9000-memory.dmp

        Filesize

        228KB

      • memory/1476-135-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/1476-136-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/1476-137-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/1476-138-0x0000000074890000-0x00000000748C9000-memory.dmp

        Filesize

        228KB

      • memory/1476-132-0x0000000000000000-mapping.dmp

      • memory/1476-143-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/2164-139-0x0000000000000000-mapping.dmp

      • memory/2380-153-0x0000000000000000-mapping.dmp

      • memory/3896-142-0x0000000000000000-mapping.dmp

      • memory/4384-154-0x0000000000000000-mapping.dmp

      • memory/4392-145-0x0000000000000000-mapping.dmp

      • memory/4392-148-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/4392-149-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/4392-150-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/4392-151-0x0000000074890000-0x00000000748C9000-memory.dmp

        Filesize

        228KB

      • memory/4392-152-0x0000000000400000-0x000000000047E000-memory.dmp

        Filesize

        504KB

      • memory/4748-130-0x0000000000620000-0x0000000000626000-memory.dmp

        Filesize

        24KB

      • memory/4748-134-0x0000000000620000-0x0000000000626000-memory.dmp

        Filesize

        24KB

      • memory/4748-131-0x0000000000620000-0x0000000000626000-memory.dmp

        Filesize

        24KB