Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2022 11:50

General

  • Target

    5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe

  • Size

    208KB

  • MD5

    12bc78e07cb69dd6ec32729240dbe537

  • SHA1

    7b7d9b115ec10074f7166ec3379fead6e816da59

  • SHA256

    5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9

  • SHA512

    c974592671b081d0af48c1aab9f9f02243773a081d9fadf70e3caa7454dca657b45bece27852397e74f601df1abdf5db496c821a5df624057355fd15c807e15a

  • SSDEEP

    3072:GXbUMNAwQ2Jpo/AkQCUyevi8xRpz81NADJ2:ibUMKwQ2J4ReviSjeKN

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\decrypt_instructions.txt

Ransom Note
Welcome to Wizard Ransomware... Admin, here's what happened... All files are encrypted with Advanced Encryption Standard 256. Maybe you noticed something? Your documents are now unreadable and corrupted. You can wonder how to decrypt it, but... No chance of that, sorry. So, what can you do now? You only have one option to decrypt your files, lets see... If you want your important files back you will need $100 in Bitcoin. However, we are able to discuss this price, maybe we can talk it down, we aren't evil. Want to start the process? You should e-mail us at: [email protected] Include your ID in the e-mail, your ID is: wpVRbZGxJ33o8YtcD7GV41x1q What if I don't pay? Nothing, meaning your files will just be encrypted forever... Bad outcome, right? However, we recommend you be quick, because our operations get shut down fast. Have fun, we're out... Sincerely, Wizard Ransomware.

Signatures

  • CryptoLocker

    Ransomware family with multiple variants.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe
    "C:\Users\Admin\AppData\Local\Temp\5e902a138174c34e5445685c82b2044e0b35565854471aaccef0315c77288dc9.exe"
    1⤵
    • Modifies extensions of user files
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic.exe SHADOWCOPY /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1752
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All/ Quiet
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Windows\system32\vssadmin.exe
        vssadmin.exe Delete Shadows /All/ Quiet
        3⤵
        • Interacts with shadow copies
        PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/916-56-0x0000000000000000-mapping.dmp

  • memory/988-57-0x0000000000000000-mapping.dmp

  • memory/1212-54-0x0000000000890000-0x00000000008CA000-memory.dmp

    Filesize

    232KB

  • memory/1212-55-0x000007FEFC581000-0x000007FEFC583000-memory.dmp

    Filesize

    8KB

  • memory/1212-60-0x0000000002006000-0x0000000002025000-memory.dmp

    Filesize

    124KB

  • memory/1544-59-0x0000000000000000-mapping.dmp

  • memory/1752-58-0x0000000000000000-mapping.dmp