Resubmissions

08/02/2023, 16:39

230208-t5xtlscc4z 10

02/03/2022, 15:02

220302-sefxqsghhm 10

Analysis

  • max time kernel
    89s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/02/2023, 16:39

General

  • Target

    64.dll

  • Size

    929KB

  • MD5

    d69589f5bd6c3c799be2d2fd2b718af1

  • SHA1

    1c68264c9b7b4fef73cc231b944388b4abaa1962

  • SHA256

    41324493142b10db127217274e21df37f6ccd13f01a8d29d2b23b7b1463423a7

  • SHA512

    b7fd1f2d6aa4d541d023035913a649ca6f1c6beb3f4c6fce890cc511a08c901479f767164c20dc9cd5826dc7a8dcf47db0c813485aeffced17f55a2a06f4d392

  • SSDEEP

    24576:GIZUIILUDJre+i4V7VywmxqKaH1S2Jl7SPFL3EOGTWqG5QVEzAJ24GOy2ipM8+ku:Z4oNe+i4V7VrmxqKaH1S237SPFL3EOGz

Score
10/10

Malware Config

Extracted

Path

C:\readme.txt

Family

conti

Ransom Note
All of your files are currently encrypted by CONTI strain. As you know (if you don't - just "google it"), all of the data that has been encrypted by our software cannot be recovered by any means without contacting our team directly. If you try to use any additional recovery software - the files might be damaged, so if you are willing to try - try it on the data of the lowest value. To make sure that we REALLY CAN get your data back - we offer you to decrypt 2 random files completely free of charge. You can contact our team directly for further instructions through our website : TOR VERSION : (you should download and install TOR browser first https://torproject.org) http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/vVkTIwyrJF8FbLfvH4LNgCBIITvprltAkaGVrmoGkJq5ExpGS7eYQ3Mi1AOkkve6 YOU SHOULD BE AWARE! Just in case, if you try to ignore us. We've downloaded a pack of your internal data and are ready to publish it on out news website if you do not respond. So it will be better for both sides if you contact us as soon as possible. ---BEGIN ID--- vVkTIwyrJF8FbLfvH4LNgCBIITvprltAkaGVrmoGkJq5ExpGS7eYQ3Mi1AOkkve6 ---END ID---
URLs

http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/vVkTIwyrJF8FbLfvH4LNgCBIITvprltAkaGVrmoGkJq5ExpGS7eYQ3Mi1AOkkve6

Signatures

  • Conti Ransomware

    Ransomware generally thought to be a successor to Ryuk.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 31 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\64.dll
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4372

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4372-132-0x0000000180000000-0x000000018003B000-memory.dmp

    Filesize

    236KB

  • memory/4372-133-0x0000000180000000-0x000000018003B000-memory.dmp

    Filesize

    236KB

  • memory/4372-134-0x0000000180000000-0x000000018003B000-memory.dmp

    Filesize

    236KB

  • memory/4372-135-0x0000000180000000-0x000000018003B000-memory.dmp

    Filesize

    236KB