Analysis

  • max time kernel
    84s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2022 03:52

General

  • Target

    702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe

  • Size

    211KB

  • MD5

    b774d0ad0ae7a9d3ec00281bc8682cd2

  • SHA1

    6c8d2b7035721dd184597cfd2864b0afd28d7bd2

  • SHA256

    702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0

  • SHA512

    606dcbfea802773509d30e7de88209a5abe11f89697bdf8dbe92a89252ed4cc9873a64797d19e2cbd71b1a39a6ed06d76a0d59821592d44a6f8a6c9e45bd94eb

  • SSDEEP

    3072:owAJkyMS4a+RQ3dTmx0Tth+cySxE+s9WRhP6v8xZduobdwV:RAJeRQ3dT++GnOR/5bGV

Malware Config

Extracted

Path

C:\readme.txt

Ransom Note
All of your files are currently encrypted by MONTI strain. If you don't know who we are - just "Google it." As you already know, all of your data has been encrypted by our software. It cannot be recovered by any means without contacting our team directly. DON'T TRY TO RECOVER your data by yourselves. Any attempt to recover your data (including the usage of the additional recovery software) can damage your files. However, if you want to try - we recommend choosing the data of the lowest value. DON'T TRY TO IGNORE us. We've downloaded a pack of your internal data and are ready to publish it on our news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. DON'T TRY TO CONTACT feds or any recovery companies. We have our informants in these structures, so any of your complaints will be immediately directed to us. So if you will hire any recovery company for negotiations or send requests to the police/FBI/investigators, we will consider this as a hostile intent and initiate the publication of whole compromised data immediately. To prove that we REALLY CAN get your data back - we offer you to decrypt two random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://4s4lnfeujzo67fy2jebz2dxskez2gsqj2jeb35m75ktufxensdicqxad.onion/chat/3194223a728c446ebfb50c494adb674da4d8c5622e124bcca9943f2b9a3f35f7/ YOU SHOULD BE AWARE! We will speak only with an authorized person. It can be the CEO, top management, etc. In case you are not such a person - DON'T CONTACT US! Your decisions and action can result in serious harm to your company! Inform your supervisors and stay calm!
URLs

http://4s4lnfeujzo67fy2jebz2dxskez2gsqj2jeb35m75ktufxensdicqxad.onion/chat/3194223a728c446ebfb50c494adb674da4d8c5622e124bcca9943f2b9a3f35f7/

Signatures

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 31 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe
    "C:\Users\Admin\AppData\Local\Temp\702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{12FB7ADA-8519-4F30-9407-AB09CE62AC88}'" delete
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\System32\wbem\WMIC.exe
        C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{12FB7ADA-8519-4F30-9407-AB09CE62AC88}'" delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3652
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads