Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 18:27

General

  • Target

    9b11711efed24b3c6723521a7d7eb4a52e4914db7420e278aa36e727459d59dd.exe

  • Size

    136KB

  • MD5

    94d087166651c0020a9e6cc2fdacdc0c

  • SHA1

    99be22569ba9b1e49d3fd36f65faa6795672fcc0

  • SHA256

    9b11711efed24b3c6723521a7d7eb4a52e4914db7420e278aa36e727459d59dd

  • SHA512

    0f5a413e57e4cedf0a8df3b33cda3c2c0732ded58c367633e8677bf88786eb786b85c97420fda150fecb68db74dc00f77064c3ea77d00f53904413c9ea3a93ba

  • SSDEEP

    1536:xxd+ReKXU/MQaL7k0B/L7s+Zi+GrZxtQpfyHvtICS4A4UdZls8XzUXiWr4X5F4GC:xtchTojrZxtMhiiZHjUyWr4X5FTDU

Score
10/10

Malware Config

Extracted

Path

C:\yv2834-readme.txt

Ransom Note
---=== Welcome. Again. ===--- [-] Whats HapPen? [-] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension yv2834. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4A7E48FBE7172FB0 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/4A7E48FBE7172FB0 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: RZB09cB0FFRlhoc/Hjun/n+geFkk9Ut/eXOblmf6GZrJgRGejlM/FglQ0wSMI/FC 2MpI3Sb/TRHNXIwk4aeEW40Muc7rWOxnXr5MzWVF0/0q/vjos9fAcx8KxqB78N81 PtPiv3ESigfrh5sihWTx2xP/00UnOGt/rBVDVuXree5nULiWWwlhg0eonEFZrJdp rrhv7wwhRUQ/nJBqUixqfRwEsHvyWlcfv0UCX73t6Z0ljolwrINrUk8Z1vMWX7D4 br70DEcjqw76kgR5sebw3Z/s5WZqIZG2oBF2PQDx8ELwt6S/K38X3j34nQgsVJ5A 9HdW4LWuz+XmNXDX09lOBolKtXAkLm6rnBovNaZH66KzK8P5O544Ml8CmeU0B6fe wF4C0ItcZNtUweh7NZXtYxrZNlzt8B2fX3No3zBEy5OkHs6WJ+V2o6Vjwhzzd+iF thWH/kPYoKxl6CV/kQtfQHvROTdzYhUYpOSu9Kv7QAEHH1TagfmwI1swEv9FuAKP PaX+hL4/rvk4NhtdY5tBT3xWz/iVsz4ni/S7DJPtJH/rItApr9WwLiWIDzAod6U6 WgnEKguMK3W4Ku4T/45iyOihukX9AHsQWxRR76uJhhhyM5/wevmCh/WLQBUsehKy kPdWgmgQhSsdtASITr2hGwjqaTHbI5s/3kj/m0BJHx2P99kfDmoDlcgYp4WZdHGl OWequBkbN48No/VsnuMvMAVg5TjJQ3F5vlEWylYyXwWf/YcymjB5HEvJQBV8/0fS ihTLiqjbHgdhaddcs24xjYT7EUD9VJ1Ky10W90o/M/usm+0xv/q0U5Aa5Fb/QbF0 tsVoPRbV+SuwhAMbhdCeI6khTy7VSpDMdAXndMsUsDsZno26VM0yhBXYwacgDnwq LP48plarG7AZYPcCdImLqmXPbTdv6WCGT/CdUyzSSorcXv6WjYexf2orBe3GV7YQ GxgncyRxSsr3ShRpz9V78i5Lj2yjPlEJWfvTL5jJHE8SUqjv7O0WOh0ec84P6ZGU TATSHlOiCtmeWt+k9c9SjxXkQydhUpRw2pe0bRswXcfs7un86iu1C6wCVbBRAArW COTgfYK7tihv4wMV9L/1xDwDFjA380za9uTSmDZGBdAzQVbVJ0iYNdqZow75l2D8 tN/s2p4sFGAMCQJnH6RoU4u/MbigC+RIQ3xTZA6q24eGkpTqqdmrwSAbwjDf80FO yA/YcdV34usL8vzaUnCPJnFjvgcoTvqVS1jSbZs32U4/wU2+F/rEmPIvaWPzr9QW mEa4jZWRs3Bqk2cPgnGoK+xrS+M= ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4A7E48FBE7172FB0

http://decoder.re/4A7E48FBE7172FB0

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b11711efed24b3c6723521a7d7eb4a52e4914db7420e278aa36e727459d59dd.exe
    "C:\Users\Admin\AppData\Local\Temp\9b11711efed24b3c6723521a7d7eb4a52e4914db7420e278aa36e727459d59dd.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SysWOW64\netsh.exe
      netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
      2⤵
      • Modifies Windows Firewall
      PID:5024
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2288
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4352
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\yv2834-readme.txt
      1⤵
        PID:4308

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Public\Desktop\yv2834-readme.txt

        Filesize

        6KB

        MD5

        5f9cc4931206b30cc1c38e71afa10e01

        SHA1

        8001cd27a7a2f2af16a88f603c7752dba6bcf4aa

        SHA256

        2e2028fff086c23c134b1366e9b9e844955eb0e0d4e316c8e6d89c0c408ea905

        SHA512

        7776a558ec34e55f647c4a96f151a9e073c016d57f588e86781668dc0d4099933459e95e59cf4e6ae1d835beb76a0fe6c997f3c3e17c91c6600451a5caf4314e

      • memory/5024-132-0x0000000000000000-mapping.dmp