Analysis

  • max time kernel
    56s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-09-2022 19:08

General

  • Target

    jan.exe

  • Size

    700KB

  • MD5

    6ff7fdc5a5e128c5ef718ee7a3fd892c

  • SHA1

    c1882dfee6a1c9fbcbb112f4d797072729c63d42

  • SHA256

    cc1a256f8e1c2dc9dc882236f4aaea17c3573025403e1f1fd428c984b952e549

  • SHA512

    d429607522dd28b59521e0ba54d7e583a78fa14fb99fb41dcfb48ed139195b62aa79b9bebd9b45b2f3d642f7d0c59a475b5919ff3f56e3a22dfdfb3f2e6458b3

  • SSDEEP

    12288:D2BZngds2/qRqG8IQqhwkPh0DH1phSZODtgESFy+PCE8ZV8tlPo7BYuY:MZngds2/qRqG8IQqhwkPh0DH1phSZODw

Malware Config

Extracted

Path

C:\HOW_TO_DECRYPT.txt

Family

hive

Ransom Note
Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: THi84gpwVsxA Password: qSzQAYfxWKRgHB1mn3fz To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed.
URLs

http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/

http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/

Extracted

Path

C:\Users\Admin\Downloads\HOW_TO_DECRYPT.txt

Family

hive

Ransom Note
Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: THi84gpwVsxA Password: qSzQAYfxWKRgHB1mn3fz To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed. Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: THi84gpwVsxA Password: qSzQAYfxWKRgHB1mn3fz To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed. Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: THi84gpwVsxA Password: qSzQAYfxWKRgHB1mn3fz To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed. Your network has been breached and all data were encrypted. Personal data, financial reports and important documents are ready to disclose. To decrypt all the data and to prevent exfiltrated files to be disclosed at http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/ you will need to purchase our decryption software. Please contact our sales department at: http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/ Login: THi84gpwVsxA Password: qSzQAYfxWKRgHB1mn3fz To get an access to .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) Follow the guidelines below to avoid losing your data: - Do not modify, rename or delete *.key files. Your data will be undecryptable. - Do not modify or rename encrypted files. You will lose them. - Do not report to the Police, FBI, etc. They don't care about your business. They simply won't allow you to pay. As a result you will lose everything. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. - Do not reject to purchase. Exfiltrated files will be publicly disclosed.
URLs

http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/

http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/

Signatures

  • Hive

    A ransomware written in Golang first seen in June 2021.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jan.exe
    C:\Users\Admin\AppData\Local\Temp\jan.exe -u THi84gpwVsxA:qSzQAYfxWKRgHB1mn3fz
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\vssadmin.exe
      "C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:8372
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\System32\notepad.exe" C:\HOW_TO_DECRYPT.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:8384
    • C:\Windows\SysWOW64\wbem\WMIC.exe
      "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:8420
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:8956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\HOW_TO_DECRYPT.txt

    Filesize

    1KB

    MD5

    45c7edb3b5d0923a0a78e787a1a5544b

    SHA1

    13b57a66c04a7358ac64dcbe3d8d868ca3712570

    SHA256

    c1f498835730e3a3c1f67bd4e015506a5f5b032cb65c7a23bd3f63584cd2f831

    SHA512

    fe78cf8d6ef9598305cfd0e47dc6908d878f9b8816716ae63564c124e5f109a3dc5492dcd148c07e32c37b6edbda743e52f5d438f23932ef31d04cc21a7e3466

  • memory/3068-140-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-131-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-119-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-120-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-121-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-122-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-123-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-143-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-125-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-126-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-127-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-129-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-130-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-116-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-132-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-133-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-134-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-128-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-136-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-137-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-138-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-139-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-141-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-142-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-144-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-146-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-148-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-149-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-151-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-150-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-147-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-145-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-124-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-118-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-135-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-152-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-153-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-154-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-155-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-156-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-157-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-158-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-159-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-160-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-161-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-162-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-163-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-164-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-165-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-166-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-117-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-176-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-180-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8372-169-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8372-177-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8372-171-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8372-173-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8384-178-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8384-172-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8384-181-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8384-170-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8384-174-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8420-179-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/8420-182-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB