Resubmissions

12/10/2022, 06:19

221012-g299bacgaq 10

04/10/2022, 09:54

221004-lw7nfsaeb5 10

Analysis

  • max time kernel
    93s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 09:54

General

  • Target

    16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20.exe

  • Size

    48KB

  • MD5

    4f6173eb23deaff1670b1b2f0f6882fe

  • SHA1

    8b0aa4a785803ebcd71fa71dfe5b3671c1ab6c13

  • SHA256

    16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20

  • SHA512

    192bf3985320e342d6808b5581f2dbcdfaafe57ebd6c08e067b1609568790432f03f7af123e3f7ddeafe94ad2ede11ab295fbc28c9111caf50f66af597e66735

  • SSDEEP

    768:AUAXzPLCUW6R/bUHUWSLa/SET7Q74guCNP:YC16lYHMa7TU3xP

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\RedKrypt-Notes-README.txt

Ransom Note
ALL YOUR FILES HAVE BEEN ENCRYPTED BY THE REDKRYPT RANSOMWARE Why me? RedKrypt doesn't choose victims. Victims choose RedKrypt. How I can recovery my files? You cannot use third party software for decrypt your files: you can use only the official RedKrypt Decryption Tool. Follow this istructions: 1) Copy your decryption ID 2) Write to [email protected] and send your decryption id 3) We'll reply with our conditions, and the decryption tool will be sent to you. YOUR REDKRYPT CLIENT-ID: 36F4858E078BFBFF000306D2

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 37 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20.exe
    "C:\Users\Admin\AppData\Local\Temp\16764b173314ddeb7341f18a7b33066a319476847ba715c53c4f0f8e9ed43a20.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\Desktop\RedKryptDecryptor.exe
      "C:\Users\Admin\Desktop\RedKryptDecryptor.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\RedKryptDecryptor.exe

    Filesize

    28KB

    MD5

    e17fd90c493ad8f1cbf7cc6d2539fd26

    SHA1

    343996c6d91fd673a18841fc18539a3486f9cc52

    SHA256

    2638ad4669db45a9dd7fbdd46a828f51890a108b095b9ebdb8a4c1cd7c1a221b

    SHA512

    3ed8d6f114a494b45429d8d413110e63effe183229b23f45d866ccae782a854b0b790661d0a891bf3e46d2bd7badd90bc460bdecd8ffb0e440d22e6c40bf62dc

  • C:\Users\Admin\Desktop\RedKryptDecryptor.exe

    Filesize

    28KB

    MD5

    e17fd90c493ad8f1cbf7cc6d2539fd26

    SHA1

    343996c6d91fd673a18841fc18539a3486f9cc52

    SHA256

    2638ad4669db45a9dd7fbdd46a828f51890a108b095b9ebdb8a4c1cd7c1a221b

    SHA512

    3ed8d6f114a494b45429d8d413110e63effe183229b23f45d866ccae782a854b0b790661d0a891bf3e46d2bd7badd90bc460bdecd8ffb0e440d22e6c40bf62dc

  • memory/1772-132-0x00007FFC2C580000-0x00007FFC2CFB6000-memory.dmp

    Filesize

    10.2MB

  • memory/1772-133-0x0000000002E32000-0x0000000002E42000-memory.dmp

    Filesize

    64KB

  • memory/1772-134-0x0000000002E72000-0x0000000002E82000-memory.dmp

    Filesize

    64KB

  • memory/4936-138-0x00007FFC2C580000-0x00007FFC2CFB6000-memory.dmp

    Filesize

    10.2MB