Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-07-2022 09:23

General

  • Target

    cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3.exe

  • Size

    875KB

  • MD5

    f1dd01a9e4b959e569250354d74e0423

  • SHA1

    7e2e524fd33261449571f1334868b17ef46e550d

  • SHA256

    cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3

  • SHA512

    d878f63456abdc4a67abd0bd208faf1e77c6baf470f84afa345c6c013f519fc4cff10ae5b3cd700e5fabf11fee3c7e1b357d81e89f7c8c09ce9ef53c99d76202

Score
10/10

Malware Config

Extracted

Path

C:\How To Restore Your Files.txt

Ransom Note
..;===+. .:=iiiiii=+= .=i))=;::+)i=+, ,=i);)I)))I):=i=; .=i==))))ii)))I:i++ +)+))iiiiiiii))I=i+:' .,:;;++++++;:,. )iii+:::;iii))+i=' .:;++=iiiiiiiiii=++;. =::,,,:::=i));=+' ,;+==ii)))))))))))ii==+;, ,,,:=i))+=: ,;+=ii))))))IIIIII))))ii===;. ,,:=i)=i+ ;+=ii)))IIIIITIIIIII))))iiii=+, ,:=));=, ,+=i))IIIIIITTTTTITIIIIII)))I)i=+,,:+i)=i+ ,+i))IIIIIITTTTTTTTTTTTI))IIII))i=::i))i=' ,=i))IIIIITLLTTTTTTTTTTIITTTTIII)+;+i)+i` =i))IIITTLTLTTTTTTTTTIITTLLTTTII+:i)ii:' +i))IITTTLLLTTTTTTTTTTTTLLLTTTT+:i)))=, =))ITTTTTTTTTTTLTTTTTTLLLLLLTi:=)IIiii; .i)IIITTTTTTTTLTTTITLLLLLLLT);=)I)))))i; :))# ASTRA LOCKER 2.0 #);=) :i)IIITTTTTTTTTLLLHLLHLL)+=)II)ITTTI)i= .i)IIITTTTITTLLLHHLLLL);=)II)ITTTTII)i+ =i)IIIIIITTLLLLLLHLL=:i)II)TTTTTTIII)i' +i)i)))IITTLLLLLLLLT=:i)II)TTTTLTTIII)i; +ii)i:)IITTLLTLLLLT=;+i)I)ITTTTLTTTII))i; =;)i=:,=)ITTTTLTTI=:i))I)TTTLLLTTTTTII)i; +i)ii::, +)IIITI+:+i)I))TTTTLLTTTTTII))=, :=;)i=:,, ,i++::i))I)ITTTTTTTTTTIIII)=+' .+ii)i=::,, ,,::=i)))iIITTTTTTTTIIIII)=+ ,==)ii=;:,,,,:::=ii)i)iIIIITIIITIIII))i+:' +=:))i==;:::;=iii)+)= `:i)))IIIII)ii+' .+=:))iiiiiiii)))+ii; .+=;))iiiiii)));ii+ .+=i:)))))))=+ii+ .;==i+::::=)i=; ,+==iiiiii+, `+=+++;` What happend? ---------------------------------------------- All Your files has been succesfully encrypted by AstraLocker 2.0 Can I get My files back? ---------------------------------------------- Sure! But You need special decryptor for that. You will get decryptor after paying. What can I do to get my files back? ---------------------------------------------- You can buy my decryption software, this software will allow you to recover all of your data and remove the Ransomware from your computer. The price for the software is about 50$ (USD). Payment can be made in Monero, or Bitcoin (Cryptocurrency) only. What guarantees? ---------------------------------------------- I value my reputation. If i do not do my work and liabilities, nobody will pay me. This is not in my interests. All my decryption software is perfectly tested and will decrypt your data. How do I pay, where do I get Monero or Bitcoin? ---------------------------------------------- Purchasing Monero or Bitcoin varies from country to country, you are best advised to do a quick Google search yourself to find out how to buy Monero or Bitcoin. Amount of Bitcoin to pay: 0,0012 (Bitcoin) or Amount of Monero to pay: 0,30 (XMR) Where i can pay? ---------------------------------------------- Monero Address: 47moe29QP2xF2myDYaaMCJHpLGsXLPw14aDK6F7pVSp7Nes4XDPMmNUgTeCPQi5arDUe4gP8h4w4pXCtX1gg7SpGAgh6qqS Bitcoin Addres: bc1qpjftnrmahzc8cjs23snk2rq0vt6l0ehu4gqxus Contact ---------------------------------------------- After payment contact: [email protected] Warning! If you report these emails, they may be suspended and NOBODY gets help. It is in Your INTEREST to get the decryptor. Do NOT: 1)Change the extension of the files. You will harm it. 2)Move encrypted files 3)Try to recover files by Yourself. It is impossible. Your files are encrypted with Curve25519 encryption algorithm, You can't decrypt files without private key. 4)Report to authoritaries. If You do it, key will be deleted, and Your files will be useless forever.

Signatures

  • Babuk Locker

    RaaS first seen in 2021 initially called Vasa Locker.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3.exe
    "C:\Users\Admin\AppData\Local\Temp\cf3bdf0f8ea4c8ece5f5a76524ab4c81fea6c3a1715b5a86b3ad4d397fca76f3.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:304
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1756
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/304-4603-0x0000000000000000-mapping.dmp

  • memory/1048-4608-0x0000000000000000-mapping.dmp

  • memory/1756-4610-0x0000000000000000-mapping.dmp

  • memory/1792-4602-0x0000000000000000-mapping.dmp

  • memory/1836-54-0x0000000074F91000-0x0000000074F93000-memory.dmp

    Filesize

    8KB

  • memory/1836-56-0x0000000076BE0000-0x0000000076C27000-memory.dmp

    Filesize

    284KB

  • memory/1836-463-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-464-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-465-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-466-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-467-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-468-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-470-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-469-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-471-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/1836-473-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-472-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-474-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-476-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-475-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-477-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-478-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-479-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-481-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-480-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-482-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-483-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-484-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-485-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-486-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-487-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-488-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-489-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-490-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-491-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-492-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-493-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-494-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-495-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-496-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-497-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-498-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-499-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-500-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-503-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-502-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-501-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-504-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-505-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-506-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-507-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-508-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-509-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-510-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-511-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-512-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-513-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-514-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-515-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-517-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-516-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-518-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-519-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-521-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-520-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-522-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-523-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-524-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-525-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-1424-0x0000000000680000-0x0000000000780000-memory.dmp

    Filesize

    1024KB

  • memory/1836-1425-0x0000000002020000-0x00000000021A1000-memory.dmp

    Filesize

    1.5MB

  • memory/1836-4604-0x00000000021B0000-0x00000000022C1000-memory.dmp

    Filesize

    1.1MB

  • memory/1836-4605-0x0000000001EE0000-0x0000000001FE1000-memory.dmp

    Filesize

    1.0MB

  • memory/1836-4606-0x00000000022D0000-0x0000000002371000-memory.dmp

    Filesize

    644KB

  • memory/1836-4607-0x0000000000680000-0x0000000000780000-memory.dmp

    Filesize

    1024KB

  • memory/1836-4609-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB