Analysis
-
max time kernel
124s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2022, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
WindowsRuntimeSecurity.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
WindowsRuntimeSecurity.exe
Resource
win10v2004-20220812-en
General
-
Target
WindowsRuntimeSecurity.exe
-
Size
18KB
-
MD5
7799cb222f53fdea43585f7d40104ed6
-
SHA1
28d6fc08e1571db3c6358c4b3b6687517afb04ec
-
SHA256
38ccc368bf474e923dae79501b03b4c5cc62bf57890a99bd4b0a8b3867630e42
-
SHA512
101cdcbb66655065ca35985efd82862a626a3bf3d080f41713b5ca41f6861169a1f02a8e6d6b23dee65fb740d63af5e46f936b3bfd84537b8580d4b30060bc4f
-
SSDEEP
384:RixYSYy3Wd/xVAngX0GEmKPK7fUl49cHFMemGCI/mP4:mFYy3QxVRpqGe498MemrP4
Malware Config
Extracted
C:\$Recycle.Bin\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt
https://tox.chat/download.html
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsPowerShell\Modules\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\System\it-IT\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_US\en_US.dic.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\iexplore.exe.mui.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dummy.dic.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_GB\excluded.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.VisualElementsManifest.xml.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.165.21\NOTICE.TXT.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Google\Update\Offline\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Internet Explorer\it-IT\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Adobe\Products.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\List.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_US\en_US.aff.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\PublicAssemblies\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_CA\excluded.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Reference Assemblies\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\CORPCHAR.TXT.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Windows NT\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Windows NT\Accessories\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\CROATIAN.TXT.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Setup Files\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Google\Update\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Google\Update\Install\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\SaslPrepProfile_norm_bidi.spp.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\ieinstal.exe.mui.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{9B826622-81DE-4C73-98AC-77A3FAEBE059}\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\System\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Internet Explorer\en-US\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\List.txt.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\setupact.log.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Windows\WindowsUpdate.log.prplcscd_cvxcv WindowsRuntimeSecurity.exe File created C:\Windows\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt WindowsRuntimeSecurity.exe File opened for modification C:\Windows\DtcInstall.log.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Windows\lsasetup.log.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Windows\PFRO.log.prplcscd_cvxcv WindowsRuntimeSecurity.exe File opened for modification C:\Windows\Professional.xml.prplcscd_cvxcv WindowsRuntimeSecurity.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2856 4776 WerFault.exe 35 -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4720 NOTEPAD.EXE 1772 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe 4776 WindowsRuntimeSecurity.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4776 WindowsRuntimeSecurity.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsRuntimeSecurity.exe"C:\Users\Admin\AppData\Local\Temp\WindowsRuntimeSecurity.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 29762⤵
- Program crash
PID:2856
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4776 -ip 47761⤵PID:4876
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ALL_OF_YOUR_FILES_ARE_ENCRYPTED_README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4720
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" C:\Users\Admin\Downloads\DisconnectConvert.vbs1⤵
- Opens file in notepad (likely ransom note)
PID:1772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\CompressUnblock.htm1⤵PID:552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a2c9416d9b5d7c3c0fa1ff3938ad585c
SHA113ad0e70e0138ab82f5bdda79e47a7dddd52c8f7
SHA2561cdc0612ea6a3b56eea4e197c58f67364791ce43dc61844a64629fbb7c84b3df
SHA512e871a753bf8eac1e87a3c8e1efc495a7b864d66a41dbf1f4884d5460f5ea18520f5926eac2163dc6f1e1db36e25fb59e0108897a9a00ef2be29da1e0dbd7d137