Analysis

  • max time kernel
    189s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 05:51

General

  • Target

    a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913.exe

  • Size

    178KB

  • MD5

    9465ee00e3234ff267a50058d159cb07

  • SHA1

    088f0370eec1a9b5d8735ef29f0fcd30a43dc11b

  • SHA256

    a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913

  • SHA512

    7cb503aac56311ec97c4dc099b3406c2007f2cc08ded0e3d170724eda570c0ad1e775878558c2fe1f308e19a3530e2bc7a4892e6a1f910191d4bc2faa90bd3d9

  • SSDEEP

    3072:W79hVbcR2QNXdQ61gLufjDHeIVVr0r4K7TFnCE/oYtsjTujCI4nD34UcO:ajcn861gLurDHlT0rzrk/ujaIUcO

Score
10/10

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3385717845-2518323428-350143044-1000\HELP_RESTORE_FILES.txt

Ransom Note
All your documents, photos, databases and other important files have been encrypted with strongest encryption RSA-2048 key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main encryptor red window, examine it and follow the instructions. Otherwise, it seems that you or your antivirus deleted the encryptor program. Now you have the last chance to decrypt your files. Open http://34r6hq26q2h4jkzj.42k2b14.net or https://34r6hq26q2h4jkzj.tor2web.fi in your browser. They are public gates to the secret server. Copy and paste the following Bitcoin address in the input form on server. Avoid missprints. 15VRG9UeWNLfwgTz19rwYBPWdAeACKSL2Z Follow the instructions on the server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org 2. In the Tor Browser open the http://34r6hq26q2h4jkzj.onion/ Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following Bitcoin address in the input form on server. Avoid missprints. 15VRG9UeWNLfwgTz19rwYBPWdAeACKSL2Z Follow the instructions on the server.
Wallets

15VRG9UeWNLfwgTz19rwYBPWdAeACKSL2Z

URLs

http://34r6hq26q2h4jkzj.42k2b14.net

https://34r6hq26q2h4jkzj.tor2web.fi

http://34r6hq26q2h4jkzj.onion/

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913.exe
    "C:\Users\Admin\AppData\Local\Temp\a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\AppData\Local\Temp\a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913.exe
      C:\Users\Admin\AppData\Local\Temp\a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Users\Admin\AppData\Roaming\sntaspc.exe
        C:\Users\Admin\AppData\Roaming\sntaspc.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Users\Admin\AppData\Roaming\sntaspc.exe
          C:\Users\Admin\AppData\Roaming\sntaspc.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1068
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
            5⤵
            • Interacts with shadow copies
            PID:1328
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A79D1D~1.EXE >> NUL
        3⤵
          PID:1864
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1036

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    File Deletion

    2
    T1107

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Impact

    Inhibit System Recovery

    2
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\sntaspc.exe
      Filesize

      178KB

      MD5

      9465ee00e3234ff267a50058d159cb07

      SHA1

      088f0370eec1a9b5d8735ef29f0fcd30a43dc11b

      SHA256

      a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913

      SHA512

      7cb503aac56311ec97c4dc099b3406c2007f2cc08ded0e3d170724eda570c0ad1e775878558c2fe1f308e19a3530e2bc7a4892e6a1f910191d4bc2faa90bd3d9

    • C:\Users\Admin\AppData\Roaming\sntaspc.exe
      Filesize

      178KB

      MD5

      9465ee00e3234ff267a50058d159cb07

      SHA1

      088f0370eec1a9b5d8735ef29f0fcd30a43dc11b

      SHA256

      a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913

      SHA512

      7cb503aac56311ec97c4dc099b3406c2007f2cc08ded0e3d170724eda570c0ad1e775878558c2fe1f308e19a3530e2bc7a4892e6a1f910191d4bc2faa90bd3d9

    • C:\Users\Admin\AppData\Roaming\sntaspc.exe
      Filesize

      178KB

      MD5

      9465ee00e3234ff267a50058d159cb07

      SHA1

      088f0370eec1a9b5d8735ef29f0fcd30a43dc11b

      SHA256

      a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913

      SHA512

      7cb503aac56311ec97c4dc099b3406c2007f2cc08ded0e3d170724eda570c0ad1e775878558c2fe1f308e19a3530e2bc7a4892e6a1f910191d4bc2faa90bd3d9

    • \Users\Admin\AppData\Roaming\sntaspc.exe
      Filesize

      178KB

      MD5

      9465ee00e3234ff267a50058d159cb07

      SHA1

      088f0370eec1a9b5d8735ef29f0fcd30a43dc11b

      SHA256

      a79d1d1727c2ef415157da46d4afa89e1c8ff815af08c3932bf74acb12438913

      SHA512

      7cb503aac56311ec97c4dc099b3406c2007f2cc08ded0e3d170724eda570c0ad1e775878558c2fe1f308e19a3530e2bc7a4892e6a1f910191d4bc2faa90bd3d9

    • memory/1068-80-0x000000000042C221-mapping.dmp
    • memory/1068-87-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1068-86-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1328-89-0x0000000000000000-mapping.dmp
    • memory/1552-66-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-67-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-54-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-59-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-61-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-57-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-55-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-65-0x0000000075DA1000-0x0000000075DA3000-memory.dmp
      Filesize

      8KB

    • memory/1552-63-0x000000000042C221-mapping.dmp
    • memory/1552-88-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1552-62-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/2036-69-0x0000000000000000-mapping.dmp