Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2023, 07:55

General

  • Target

    E906FA3D51E86A61741B3499145A114E9BFB7C56.exe

  • Size

    261KB

  • MD5

    6d3d62a4cff19b4f2cc7ce9027c33be8

  • SHA1

    e906fa3d51e86a61741b3499145a114e9bfb7c56

  • SHA256

    afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18

  • SHA512

    973643639cb02491b86d5b264ee8118a67d8a83453307aea95de2f4c6aa55819d37730c41dc3338116ebe86f9a4f2bba7d9537ea744ae08b9755f05c15153fad

  • SSDEEP

    6144:93g0BQG+aZiycigV5bbEo6dZbBODPIsjQ/UFsYWo:93g0OGjZiycigVRbObBODTMUdj

Score
10/10

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-1214520366-621468234-4062160515-1000\HELP_RESTORE_FILES.txt

Ransom Note
All your documents, photos, databases and other important files have been encrypted with strongest encryption RSA-2048 key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main encryptor red window, examine it and follow the instructions. Otherwise, it seems that you or your antivirus deleted the encryptor program. Now you have the last chance to decrypt your files. Open http://3kxwjihmkgibht2s.wh47f2as19.com or http://34r6hq26q2h4jkzj.7hwr34n18.com , https://3kxwjihmkgibht2s.s5.tor-gateways.de/ in your browser. They are public gates to the secret server. Copy and paste the following Bitcoin address in the input form on server. Avoid missprints. 1D8vU5smRdUbxePiBFDRgAax5sxFU8nM4C Follow the instructions on the server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org 2. In the Tor Browser open the http://34r6hq26q2h4jkzj.onion/ Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following Bitcoin address in the input form on server. Avoid missprints. 1D8vU5smRdUbxePiBFDRgAax5sxFU8nM4C Follow the instructions on the server.
Wallets

1D8vU5smRdUbxePiBFDRgAax5sxFU8nM4C

URLs

http://3kxwjihmkgibht2s.wh47f2as19.com

http://34r6hq26q2h4jkzj.7hwr34n18.com

https://3kxwjihmkgibht2s.s5.tor-gateways.de/

http://34r6hq26q2h4jkzj.onion/

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exe
    "C:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exe
      C:\Users\Admin\AppData\Local\Temp\E906FA3D51E86A61741B3499145A114E9BFB7C56.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Roaming\pwetlib.exe
        C:\Users\Admin\AppData\Roaming\pwetlib.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Users\Admin\AppData\Roaming\pwetlib.exe
          C:\Users\Admin\AppData\Roaming\pwetlib.exe
          4⤵
          • Executes dropped EXE
          • Modifies extensions of user files
          • Loads dropped DLL
          • Adds Run key to start application
          • Sets desktop wallpaper using registry
          • Drops file in Program Files directory
          • Modifies Control Panel
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1168
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
            5⤵
            • Interacts with shadow copies
            PID:1504
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\E906FA~1.EXE >> NUL
        3⤵
        • Deletes itself
        PID:268
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\pwetlib.exe

    Filesize

    261KB

    MD5

    6d3d62a4cff19b4f2cc7ce9027c33be8

    SHA1

    e906fa3d51e86a61741b3499145a114e9bfb7c56

    SHA256

    afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18

    SHA512

    973643639cb02491b86d5b264ee8118a67d8a83453307aea95de2f4c6aa55819d37730c41dc3338116ebe86f9a4f2bba7d9537ea744ae08b9755f05c15153fad

  • C:\Users\Admin\AppData\Roaming\pwetlib.exe

    Filesize

    261KB

    MD5

    6d3d62a4cff19b4f2cc7ce9027c33be8

    SHA1

    e906fa3d51e86a61741b3499145a114e9bfb7c56

    SHA256

    afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18

    SHA512

    973643639cb02491b86d5b264ee8118a67d8a83453307aea95de2f4c6aa55819d37730c41dc3338116ebe86f9a4f2bba7d9537ea744ae08b9755f05c15153fad

  • C:\Users\Admin\AppData\Roaming\pwetlib.exe

    Filesize

    261KB

    MD5

    6d3d62a4cff19b4f2cc7ce9027c33be8

    SHA1

    e906fa3d51e86a61741b3499145a114e9bfb7c56

    SHA256

    afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18

    SHA512

    973643639cb02491b86d5b264ee8118a67d8a83453307aea95de2f4c6aa55819d37730c41dc3338116ebe86f9a4f2bba7d9537ea744ae08b9755f05c15153fad

  • \Users\Admin\AppData\Roaming\pwetlib.exe

    Filesize

    261KB

    MD5

    6d3d62a4cff19b4f2cc7ce9027c33be8

    SHA1

    e906fa3d51e86a61741b3499145a114e9bfb7c56

    SHA256

    afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18

    SHA512

    973643639cb02491b86d5b264ee8118a67d8a83453307aea95de2f4c6aa55819d37730c41dc3338116ebe86f9a4f2bba7d9537ea744ae08b9755f05c15153fad

  • \Users\Admin\AppData\Roaming\pwetlib.exe

    Filesize

    261KB

    MD5

    6d3d62a4cff19b4f2cc7ce9027c33be8

    SHA1

    e906fa3d51e86a61741b3499145a114e9bfb7c56

    SHA256

    afaba2400552c7032a5c4c6e6151df374d0e98dc67204066281e30e6699dbd18

    SHA512

    973643639cb02491b86d5b264ee8118a67d8a83453307aea95de2f4c6aa55819d37730c41dc3338116ebe86f9a4f2bba7d9537ea744ae08b9755f05c15153fad

  • memory/1096-54-0x0000000075671000-0x0000000075673000-memory.dmp

    Filesize

    8KB

  • memory/1168-90-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1168-94-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1168-92-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-60-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-62-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-69-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-58-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-75-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-56-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-64-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-68-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1708-55-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB