Analysis

  • max time kernel
    250s
  • max time network
    359s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2022 11:03

General

  • Target

    ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe

  • Size

    4.5MB

  • MD5

    4b9eb7effc356c12d0f6f49593b0f85c

  • SHA1

    f7ffa9d3683b0952aecf8899a8a3137173e25023

  • SHA256

    ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e

  • SHA512

    eab1c86ea54d31ba26055df55279294162c065421614dcc8ffc24774f39cbf80546c105932e2e25b1bef70633a93a861c9748f1766d6d35c5121bcfa6169cf47

  • SSDEEP

    98304:v3hs0eL1EW2uN16nwNMp9VeEQQD+t0DCZFOs:PFeiL8FiTV31+t0D0F

Score
10/10

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Hello! All your files are encrypted! Write to us if you want to restore them. We can make it very fast. We also downloaded 700 GB of valuable information from your network. Contact me by email: [email protected] or [email protected] The subject line must contain an encryption extension or the name of your company! Do not rename encrypted files, you may lose them forever. You may be a victim of fraud. Free decryption as a guarantee. Send us up to 3 files for free decryption. The total file size should be no more than 1 MB! (not in the archive), and the files should not contain valuable information. (databases, backups, large Excel spreadsheets, etc.) To contact us, we recommend that you create an email address at protonmail.com or tutanota.com Because gmail and other public email programs can block our messages! If you do not receive a response from us for a long time, check your spam folder. =========================================================== Customer service TOX ID: 0FF26770BFAEAD95194506E6970CC1C395B04159038D785DE316F05CE6DE67324C6038727A58 Only emergency! Use if support is not responding

Signatures

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6b3652c6a1591f90c44831248a641c13ddcb1f0efd2c0de374bfe803a0039e.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\btjucsjxyocsucsalgk.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Windows\system32\sc.exe
        SC QUERY
        3⤵
        • Launches sc.exe
        PID:5096
      • C:\Windows\system32\findstr.exe
        FINDSTR SERVICE_NAME
        3⤵
          PID:4400
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\tuoqmacomghbsklpxk.bat
        2⤵
          PID:2380

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\btjucsjxyocsucsalgk.bat

        Filesize

        43B

        MD5

        55310bb774fff38cca265dbc70ad6705

        SHA1

        cb8d76e9fd38a0b253056e5f204dab5441fe932b

        SHA256

        1fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d

        SHA512

        40e5a5e8454ca3eaac36d732550e2c5d869a235e3bbc4d31c4afa038fe4e06f782fa0885e876ad8119be766477fdcc12c1d5d04d53cf6b324e366b5351fc7cd4