Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 06:02

General

  • Target

    560c2b56abc7854631568fda3564a898927a840cf0f65e21e192c7159b9b97c5.exe

  • Size

    334KB

  • MD5

    297d424347e669aa6e1ba055008f83f7

  • SHA1

    a80df965e8346b04f254bd965091a9279a0076ed

  • SHA256

    560c2b56abc7854631568fda3564a898927a840cf0f65e21e192c7159b9b97c5

  • SHA512

    0bb9d1ed58af93aa372c7c62179505bae1a1305006dc2b65cd36d5d0bce4c9774baf71ed19ca849dc1d3f85bc3e3e533aa0e756e8f85c76c28a3ddf5445d6cf6

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\Recovery+cojbh.txt

Ransom Note
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/50EEE69D6322F6C3 2. http://b4youfred5485jgsa3453f.italazudda.com/50EEE69D6322F6C3 3. http://5rport45vcdef345adfkksawe.bematvocal.at/50EEE69D6322F6C3 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization 3. Type in the address bar: fwgrhsao3aoml7ej.onion/50EEE69D6322F6C3 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/50EEE69D6322F6C3 http://b4youfred5485jgsa3453f.italazudda.com/50EEE69D6322F6C3 http://5rport45vcdef345adfkksawe.bematvocal.at/50EEE69D6322F6C3 *-*-* Your personal page Tor-Browser: fwgrhsao3aoml7ej.ONION/50EEE69D6322F6C3 *-*-* Your personal identification ID: 50EEE69D6322F6C3
URLs

http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/50EEE69D6322F6C3

http://b4youfred5485jgsa3453f.italazudda.com/50EEE69D6322F6C3

http://5rport45vcdef345adfkksawe.bematvocal.at/50EEE69D6322F6C3

http://fwgrhsao3aoml7ej.onion/50EEE69D6322F6C3

http://fwgrhsao3aoml7ej.ONION/50EEE69D6322F6C3

Signatures

  • suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

    suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\560c2b56abc7854631568fda3564a898927a840cf0f65e21e192c7159b9b97c5.exe
    "C:\Users\Admin\AppData\Local\Temp\560c2b56abc7854631568fda3564a898927a840cf0f65e21e192c7159b9b97c5.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\dkobqouqvvrm.exe
      C:\Windows\dkobqouqvvrm.exe
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1428
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2016
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1760
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\560C2B~1.EXE
      2⤵
      • Deletes itself
      PID:2032
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2004
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1224

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

1
T1107

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\RECOVERY.HTM
    Filesize

    8KB

    MD5

    4090d0891afa4210a6c021eb73d0332e

    SHA1

    6b22dc84d0e0eb82d6255b772f15ccd6732fcb97

    SHA256

    aad03372000615cec2a41d4c7af277f18e2c0bbf7be51eb323f3502dfc8d08c3

    SHA512

    75e5d155cf0f61a21326931b1b347d85feff7ffa78a54b6812f0cd856e420c3bf0f18606f9f7180880edd42389db6bb3151748702be9c2fb4c3244d538807a6d

  • C:\Users\Admin\Desktop\RECOVERY.TXT
    Filesize

    2KB

    MD5

    70d83140e3241972512140313f92658f

    SHA1

    2e09bf84590d3f26307c9a25029cac70184a58a8

    SHA256

    1efcdbd57764fbec1a159e90fca11b04812a32757b81f534b5d42c06dda781c7

    SHA512

    6dc16901e7d5a5dcecd94b6ce4f7b1f671b5a978d6c3b7f127656e73f0328667ec0f49dfcd3eb86abeed1b5d6876bc47fa63b95673e4f882ec2bcb688958bb7e

  • C:\Users\Admin\Desktop\RECOVERY.png
    Filesize

    68KB

    MD5

    5cf7a4bf3936609df3c8022996eebe11

    SHA1

    a7d2392c8c5f5bdcb8ee5d66eb85f5226474875f

    SHA256

    1a7ba6b46c050620cad9b51390634b099b7b4a9bc547b173c864f8c73f2f79eb

    SHA512

    a521be01b0ae6c9b60cd77bd878f4e2da4e4667083ddf0769dee5571313e70534429e9f304eb22780501081e7d5ea1e9908cc9b13d5384dba0be0d42471e9026

  • C:\Windows\dkobqouqvvrm.exe
    Filesize

    334KB

    MD5

    297d424347e669aa6e1ba055008f83f7

    SHA1

    a80df965e8346b04f254bd965091a9279a0076ed

    SHA256

    560c2b56abc7854631568fda3564a898927a840cf0f65e21e192c7159b9b97c5

    SHA512

    0bb9d1ed58af93aa372c7c62179505bae1a1305006dc2b65cd36d5d0bce4c9774baf71ed19ca849dc1d3f85bc3e3e533aa0e756e8f85c76c28a3ddf5445d6cf6

  • C:\Windows\dkobqouqvvrm.exe
    Filesize

    334KB

    MD5

    297d424347e669aa6e1ba055008f83f7

    SHA1

    a80df965e8346b04f254bd965091a9279a0076ed

    SHA256

    560c2b56abc7854631568fda3564a898927a840cf0f65e21e192c7159b9b97c5

    SHA512

    0bb9d1ed58af93aa372c7c62179505bae1a1305006dc2b65cd36d5d0bce4c9774baf71ed19ca849dc1d3f85bc3e3e533aa0e756e8f85c76c28a3ddf5445d6cf6

  • memory/1428-64-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/1428-62-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/1428-57-0x0000000000000000-mapping.dmp
  • memory/1764-65-0x0000000000000000-mapping.dmp
  • memory/1932-61-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/1932-54-0x00000000760E1000-0x00000000760E3000-memory.dmp
    Filesize

    8KB

  • memory/1932-56-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/1932-55-0x0000000000350000-0x000000000037D000-memory.dmp
    Filesize

    180KB

  • memory/2016-66-0x0000000000000000-mapping.dmp
  • memory/2032-60-0x0000000000000000-mapping.dmp